Key Considerations in Preparation for Your Cyber Renewal - Risk Strategies

Page created by Edwin Cole
 
CONTINUE READING
Key Considerations in Preparation for Your Cyber Renewal - Risk Strategies
Key Considerations in Preparation
     for Your Cyber Renewal
Key Considerations in Preparation for Your Cyber Renewal - Risk Strategies
Speakers

   Leslie Gravel,     Mike Makowka,      Reuben Vandeventer,
   National Account   CISO, Tracepoint   CEO SecondSight
   Director, RSC

                                            © 2021 Risk Strategies Company. Proprietary & Confidential   2
Key Considerations in Preparation for Your Cyber Renewal - Risk Strategies
Agenda
•   State of the Market
•   Top Risk Management Concerns
•   Remediation Strategy

                                                                       3
                                   © 2021 Risk Strategies Company. Proprietary & Confidential
Key Considerations in Preparation for Your Cyber Renewal - Risk Strategies
State of the Market
Key Considerations in Preparation for Your Cyber Renewal - Risk Strategies
Factors of a Hardened Market

•Targeted Industry Classes

•Systemic Exposure

•Ransomware- an Industry of
Profits

•Double and Triple Extortion
Techniques

•Heightened Regulatory Scrutiny

•200-600% Loss ratios with
carriers                          Data from Advisen

                                   © 2021 Risk Strategies Company. Proprietary & Confidential   5
Key Considerations in Preparation for Your Cyber Renewal - Risk Strategies
Ransomware Trends

150% Increase in Frequency
Uptick in ransomware incidents since 2018

70% of Ransomware Attacks
Involved Data Exfiltration Threat
Up 43% from Q3 2020

21 Average Days of Downtime
Up 11% from Q3 2020

83% of Incidents
Impacting business under $300m in revenues

67.8% Industry-wide loss ratio
Up from 44.8% in 2019

                                             © 2021 Risk Strategies Company. Proprietary & Confidential   6
Recent Events
  Colonial Pipeline
  • May 6: Attack launched
  • May 7: Ransomware payment of $4.4M ($2.3M
     later recovered)                               Microsoft Exchange
  • May 12: Pipeline restarted                      •   Behind the scenes email and calendar software
  • Could have been prevented with MFA
                                                    •   March 2, 2021 – Emergency Security Update & patches
  SolarWinds
                                                        released
  • September 2019- gained access                   •   30,000+ businesses noted by Krebs Security
  • March 26 2020- Software update “Orion”
                                                    •   250,000 Estimated by Wall Street Journal
  • December 13, 2020- Discovered
  • 18,000+ customers affected                      •   Allowed threat actors access to email accounts
  • Coordinated response by government agencies
  • Threat actors spent 1+ year in their system
  • Could have been detected with EDR

  JBS
  • June 1, 2021
  • Paid $11M in Bitcoin Ransom
  • No customer data was compromised
  • Affected facilities United States, Canada and
     Australia                                                                   © 2021 Risk Strategies Company. Proprietary & Confidential   7
Underwriting Standardization

 Subjects                              Specifics
                                                                                 •   Carrier Requirements:
                                       For remote access? Cloud access? Back
 Multifactor Authentication            up access? Privileged accounts? Vendor          • Full Submissions - Supplemental
                                       access to network?                                  Ransomware applications
 Close Remote Desktop Protocol (RDP)
 ports                                                                                 • Specific Systemic Breach questions
                                       Offline, Air-Gapped, encrypted,                 • 5-year loss runs
 Backups
                                       segmented, how often are they tested?
 Privileged Accounts                   How many controls around them                   • Claims related data - Remediation steps,
                                                                                           costs incurred, event details
 Employee Training                     Phishing awareness, et.
                                       Controls, authentication & permissions,
 Use of Active Directory
                                       purpose
                                       Response time for critical patches,
                                       Common Vulnerabilities and Exposures
 Patching cadence
                                       (CVE) maintenance- how are they
                                       handled on a scale from high-low
                                       Tools implemented, what percentage of
 Endpoint Security                     the organization, is there an incident
                                       response team, exposed web browsers

 Application Security                  HTTPS encryption, etc.
 Business Continuity Plan, Incident    How often is it tested? Does it include
 Response Plan                         Ransomware?

                                                                                                        © 2021 Risk Strategies Company. Proprietary & Confidential
Top Risk Management Controls
We all have to   Underwriting process is getting more technical, and will
                 only get more technical.

adapt to a
new world
                 Underwriters ask for more accurate quantification of
                 what data exist inside the company to understand the
                 real risk.

                 As risk grows, so does complexity, making it harder to
                 obtain cyber insurance to hedge against those risks.

                                               © 2021 Risk Strategies Company. Proprietary & Confidential
Evolution

                Previously                             Current State

Market Forces   Soft market (everyone gets coverage)   Hardened Market (80%) get declined

Methodology     Outside In                             Inside Out

Focus Area      Perimeter and Network Security         Digital Assets

Goal            Appropriate Cyber Coverage             Net Zero Digital Risk

                                                                           © 2021 Risk Strategies Company. Proprietary & Confidential
1. Multi-Factor Authentication (MFA)

Implementing MFA (For Remote and Administration
Access)
• Evaluate your environment and determine MFA
   requirements
• Evaluate vendors; both product providers and
   integrators
• Pilot implementation                                 "89% of the Hacking varieties in
• Verify pilot solution
• Communicate release to user base                     web applications involved some
• Implement for all users
• Privileged Accounts                                 sort of credential abuse." – 2021
Security Practice
                                                        Verizon Data Breach Incident
• Use passphrases instead of passwords
• Review access logs regularly
                                                                   Report
• Use dedicated privilege accounts
• Use multi-factor authentication wherever possible

                                                                      © 2021 Risk Strategies Company. Proprietary & Confidential   12
3. Add Visibility in your Environment
•   Visibility is key contributor to the success of your security posture.
•   Visibility and monitoring should include these 5 areas of your security posture
      •   Endpoints - Endpoint Detection and Response tool (ex: Crowdstrike, Cybereason, Carbon Black, etc)
      •   Email – Email security tool (ex. Proofpoint, Mimecast, Avanon, etc.)
      •   Internet - Url Gateway (ex. Zscaler, Palo Alto, etc.)
      •   Cloud and Software as a Service (SaaS) – Cloud Access Security Broker (CASB) (ex. Netskope, Microsoft Cloud App Security,
          Bitglass, etc.)
      •   Network - Network monitoring tools (ex. DarkTrace, Firemon, CyberX, etc)

Having tools with no one monitoring them is like having no tools at all.

                                                                                                    © 2021 Risk Strategies Company. Proprietary & Confidential   13
4. Business Continuity Plan (BCP) and Incident Response Plan (IR)
•   IR plan is a playbook focused on how organization responses to incident (such as cyber event)
      •   Key things to think about when creating an IR plan
            •   Who is involved (C-suite, legal, IT, PR, etc.)
            •   What does the change of communication look like
            •   What steps are to be taken (avoid the IT hero)
            •   Do you have an IR retainer, a breach coach, etc.

•   BCP are playbooks are for when the organizations have an interruption in service or operations (ex: Ransomware
    Event)
      •   Key things to think about when creating an BCP
            •   What are your most crucial assets
            •   What should systems or data be backed up (Hot, Warm, or Cold sites)
            •   What order should systems be brought back online
            •   What are your Recovery Point Objectives (RPO) and Recovery Time Objectives (RTO)

•   Most important thing to do with IR plan and BCP is: TEST,                 TEST, TEST, and then TEST some more.

                                                                                                   © 2021 Risk Strategies Company. Proprietary & Confidential   14
How can you insure and
manage what you can’t see.
5. Quantification

                    © 2021 Risk Strategies Company. Proprietary & Confidential   16
6. Backup Strategy
•   Create an inventory of assets prioritized by the criticality to the business operation- avoid “blanket approaches” to
    backup strategy.
•   Identify the company’s digital assets and their correlation to the business operations- establish an operational
    backup cadence.
      •   Critical assets should be more frequent than non-critical.

•   Implementation:
      •   Focus on the technicalities
      •   Off-network: backups should be 100% physically segmented from the existing infrastructure and network
      •   Immutable: stored digital data that, once saved, is fixed and unchangeable—and cannot be changed, overwritten, or deleted
      •   Air-Gapped: Air-Gapping is the process of creating a layer of separation between one environment and another.

•   Return to the beginning: what assets matter? Your backup capabilities should be asking this question everyday, and
    repeating all subsequent steps. This is the only way to ensure that your backup of digital assets (servers, data,
    metadata, etc.) are truly indicative of your organization’s current operation. This, also, is the only way to ensure the
    least downtime should an event occur.
                                                                                                     © 2021 Risk Strategies Company. Proprietary & Confidential   17
Air Gapping

One of the most effective ways is to Airgap your critical assets.

“Separating a computer from             • Claim size can be reduced up to
other networks is called air              88% with a Airgap
gapping; the “airgap” isolates          • Airgap Reduces cycle time to
                                          recovery
the digital assets, providing an        • Airgap Removes leverage from
extra layer of security.”                 the bad actors

                                                             © 2021 Risk Strategies Company. Proprietary & Confidential
Basic Security Measure Checklist

✓ Multi-Factor Authentication Enterprise Wide             ✓ Implement Visibility Tools Like Endpoint Detection
                                                            and Response (EDR)
✓ Minimize non-necessary network and internet
  connectivity.                                           ✓ You must train employees to be vigilant against
                                                            phishing attacks. These attacks are designed to
✓ Shutdown remote access connections, such as RDP.          compromise user credentials and harvest sensitive
✓ Shutdown all non-US based IP address connections          data.
  (geofence) at the firewall level if feasible.           ✓ Prioritize patching efforts based on your exposure,
✓ Separate user and admin accounts and remove local         most critical systems, and highest risk vulnerabilities.
  admin from user’s computers.                            ✓ Segment your network environment.
✓ Conduct and audit of your company’s Active Directory    ✓ Segmentation can restrict unauthorized movement
  for any unauthorized or unnecessary accounts.             across your environment. If attackers can breach
✓ Perform regular vulnerability scanning. Evaluate your     back-end servers, they may be able to move laterally
  own environment regularly, track all discovered           to access other portions of your network, doing
  vulnerabilities, and prioritize and patch them in an      further damage, and possibly gaining a foothold
  aggressive manner.                                        across multiple systems.

✓ Conduct an audit of your company’s GPO policy.

                                                                                        © 2021 Risk Strategies Company. Proprietary & Confidential   19
Cyber Insurance As A Service

                                                                              Autonomous Digital Asset & Risk Profile
Security Posture Assessment
                                                                              An AI-based digital asset profile allows you to see your
Report from Tracepoint with maturity levels on key cyber security domains
                                                                              digital assets and risk with complete clarity for the first
with recommendations for immediate action
                                                                              time, autonomously. A deeper dive profile will identify all
Endpoint Detection & Response
                                                                              of the sensitive and regulatory related assets to calculate
Phishing Testing & Security Awareness Training                                the monetary value of your digital risk.

Table Top Exercise
                                                                              AirGap Back-up Technology to Preserve Business
Stress test incident response plan by simulating two data breach scenario
                                                                              Continuity
with internal stakeholders
                                                                              SecondSight has pre-built AirGap technology and leading
Penetration Testing-
                                                                              backup providers so the asset and risk profile will
White hat hackers attempting to gain access to identify vulnerabilities for   continuously send signals to the Airgap solution to back-
remediation
                                                                              up the most critical digital assets as your business
                                                                              evolves.

                                                                                                        © 2021 Risk Strategies Company. Proprietary & Confidential   20
Q&A

This presentation is proprietary and confidential and is not to be duplicated or distributed to the public or any third party without the written consent of Risk Strategies Company . The contents of this presentation are for general informational
purposes only and Risk Strategies Company makes no representation or warranty of any kind, express or implied, regarding the accuracy or completeness of any information contained herein. Any recommendations contained in this
presentation are intended to provide insight based on currently available information for consideration and should be vetted against applicable legal and business needs before application to a specific client.
Thank You!

This presentation is proprietary and confidential and is not to be duplicated or distributed to the public or any third party without the written consent of Risk Strategies Company . The contents of this presentation are for general informational
purposes only and Risk Strategies Company makes no representation or warranty of any kind, express or implied, regarding the accuracy or completeness of any information contained herein. Any recommendations contained in this
presentation are intended to provide insight based on currently available information for consideration and should be vetted against applicable legal and business needs before application to a specific client.
You can also read