Reinventing the Internet for Trust - Accenture
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
CONTENTS 04 BUILDING ON TRUST 18 STEPPING UP TO MAKE A STAND 35 PAVING THE WAY FOR A TRUSTWORTHY DIGITAL 08 WHY THE INTERNET CAN’T SUSTAIN ABOVE GROUND: ECONOMY THE DIGITAL ECONOMY BUSINESS INITIATIVES 37 APPENDIX 12 The Internet Just Can’t Keep Up 21 Governance Join Forces with Other 43 ACKNOWLEDGMENTS 13 The IoT Effect Companies and Govern Globally 45 SOURCES 14 Identities in Crisis 26 Business Architecture 47 ABOUT THE AUTHORS 15 No Flow Versus Free Flow Connect and Protect with a Business Model That Runs on 16 The Cost of Insecurity Digital Trust 17 Keeping Tabs on Cybersecurity BELOW GROUND: Investments THE INTERNET’S INFRASTRUCTURE 31 echnology T Advance Businesses and Enhance Safety Through Technology
Authors Omar Abbosh Kelly Bissell Group Chief Executive, Accenture Senior Managing Director, Communications, Media & Technology Accenture Security Omar is responsible for the company’s US$8 billion Kelly leads the company’s US$2 billion security business business serving the digital platforms, media, across all industries. As a recognized cybersecurity expert, telecommunications, semiconductor and Kelly specializes in incident response, identity management, consumer electronics industries. Omar brings three privacy and data protection, secure software development, decades of experience to his role, and his and cyber risk management. experience and deep connections in Silicon Valley Kelly’s vision is to help businesses embed security in enable him to stay ahead of key shifts across everything they do. multiple technologies. 3 SECURING THE DIGITAL ECONOMY
Building on Trust When a person creates an online Why? The once open, global escalating cyberthreats. Internet has outgrown its original Companies have handled many account, makes a purchase from a purpose as a communication and threats with markedly successful website or downloads an app, it’s not information-sharing tool. As the results, but their efforts have not just the exchange of data, goods or Internet has become more solved the larger problem of services taking place. complex, digitally fueled Internet fragility. innovation has outpaced the Attackers need only a single lucky It’s a transaction in the ultimate ability to introduce adequate strike, while defenders must be currency: trust. safeguards against constantly vigilant against any cybercriminals. potential type of incursion. Today, there is a real risk that trust in Unless business leaders take the digital economy is eroding. effective action, there is a real The fragile nature of the Internet is putting the value of the digital risk that this lack of safeguards economy at risk, which is why could reduce the growth of the CEOs need to end their entire digital economy, hurting piecemeal approach and put trust both individual companies and and security at the forefront of the economy as a whole. business strategy. CEOs are aware of the problem and have increased spending on cybersecurity in response to 4 SECURING THE DIGITAL ECONOMY
In an analysis we conducted with 30 leading technologists, and additional fieldwork with 1,700 C-level executives, we uncovered concrete actions CEOs can take to begin the crucial work of securing the digital economy. For a practical framework that can help Similarly, securing the digital Another above-ground action safeguard the Internet’s future, leaders economy will take more than CEOs can take is steering what fixing Internet technology and we call business architecture—a should look to an analogy from the oil and network issues below ground. company’s own business model gas industry. Oil and gas executives spend There are also clear opportunities and value chain—in a direction much of their time determining how to for CEOs to step up on the above- that makes their own enterprise maximize production—which often means ground business initiatives. secure. Examples of actions that focusing on the engineering and So, what can business leaders do can be taken include committing technology solutions that largely operate to giving data access only to above ground? CEOs can own people who need it and who have “below ground.” and drive a secure Internet as a the right credentials. Importantly, critical component of their they should extend their business strategies. One key However, innovative extractive technologies commitment to making their own above-ground action would be enterprise secure to their are only part of the equation. Executives improving governance. partners, applying the same also have to address the many challenges CEOs need to join forces with standards to their entire business related to business and operating models, other top executives, government ecosystem. strategy, politics and economics that exist leaders and regulators to develop And they should ensure that the “above ground.” principle-based standards and very idea of a trusted digital policies to safeguard the Internet. economy is embedded in all future business models. 5 SECURING THE DIGITAL ECONOMY
To some CEOs, above-ground embrace new technologies that decision-making opportunities can advance their businesses and may seem more accessible than enhance digital safety. Meanwhile, below-ground choices, but they should elevate their leadership is needed in both, understanding of how the same even from CEOs outside the technologies can introduce Building a trustworthy digital economy technology sector. All CEOs also unintended vulnerabilities. will take decisive—and, at times, have the opportunity to influence unconventional—leadership from the But the CEOs whose businesses and inspire technology focus on the Internet itself have an C-suite. Where should they start? By infrastructure investments below ground. By making decisions to even greater responsibility: They working collaboratively with each other. can concentrate explicitly on If they follow the roadmap detailed on update everything from devices promoting innovation in the to cables and networks, CEOs page 7, leaders could bring back the Internet’s infrastructure. Their can support the complexity and actions resolve inherent confidence needed in the Internet for connectivity of today’s Internet individuals, organizations and societies vulnerabilities, enable growth and while also promoting security. prepare for the advent of quantum to innovate and grow. These technology decisions computing, which will present new present the third concrete way opportunities and threats. CEOs can proactively secure the digital economy. CEOs should 6 SECURING THE DIGITAL ECONOMY
Governance: ABOVE Join Forces with Other Companies and GROUND Govern Globally BA NK Standards and 74 percent of business leaders say Best Practices solving the cybersecurity challenges of the Internet economy will require an organized group effort. Business Architecture: Connect and Protect with a Model Run on Digital Trust 80 percent of business leaders say protecting companies from weaknesses in third parties is BELOW increasingly difficult given the complexity of today’s sprawling GROUND Internet ecosystems. Technology Investments Technology: Advance Business and Enhance Safety 79 percent of business leaders say the rate of technology adoption and innovation has outpaced the security How Leaders Can Address Internet Security: features needed to ensure a resilient Above ground, the strategic initiatives of CEOs can lead to standards and best digital economy. practices. Below ground, through innovative technology improvements, CEOs can invest in improving the Internet’s infrastructure. 7 SECURING THE DIGITAL ECONOMY
Without trust, the future of our dependent on the Internet. At Handling these connections requires more lines of digital economy and its nearly the same time, while businesses, code, more data and more capacity. Without a limitless potential is in peril. individuals and societies are more resilient and trustworthy Internet, a single Piecemeal efforts to address increasingly connected, those breach can have serious, cascading effects. For cybersecurity issues—including connections are also becoming example, the 2017 NotPetya cyberattack cost the Internet’s inherent flaws, more complex. Maersk more than US$300 million, and the vulnerabilities from the Internet damages to all other companies affected totaled of Things (IoT), identity and data more than US$10 billion.4 veracity and increasing digital In 2007, there were 1.2 billion Against this backdrop, with computers and networks fragmentation—have fallen Internet users. In 2017, there were so deeply embedded in critical infrastructure such short. Through their decisions 4.2 billion—more than half of the as water supply and public health systems, the risks above ground on industry-wide global population.1 to both the economy and public safety are high. governance and their business architecture and technology Consider the impact of the 2017 WannaCry infrastructure below ground, The number of IoT-connected cyberattack on the United Kingdom National Health however, CEOs can have the devices will likely reach 25 billion Service (NHS). It led to the cancellation of 19,000 influence necessary to by 2021.2 appointments and the diversion of ambulances, and collaboratively address these ultimately cost almost £100 million.5 overarching issues. Yet 79 percent of our respondents reported that By 2024, Long-Term Evolution Many of the issues affecting their organization is adopting new and emerging (LTE) networks (also called 4G) today’s Internet are due in part technologies faster than they can address related will cover an estimated to its rapid growth in both users security issues. 90 percent of the population, and applications. The entire with 5G networks covering about digital economy is now 40 percent.3 9 SECURING THE DIGITAL ECONOMY
Even as 68 percent of CEOs report that their 100% 100% 100% businesses’ dependence on the Internet is increasing, they acknowledge that their confidence 90% in Internet security, already low at 30 percent, will 76% 80% drop even lower if nothing changes to improve it. In 70% the next five years, the confidence level in the 60% 100% Internet is forecast to drop to 25 percent, while 50% dependence on it is assumed to remain at 40% 100 percent. (See Exhibit 1). 30% 30% Nearly 80 percent of the S&P 500 companies in our 23% 25% analysis have also mentioned cybersecurity 20% 10% 19% initiatives during recent earnings calls.6 10% 0% Five years ago, that figure was just slightly more 2008 2013 2018 2023 than 50 percent. Confidence in Internet Dependence on Internet As the Internet’s fault lines are becoming more apparent, companies are trying to build trust equity and are publicly discussing ways to do so. Exhibit 1: Dependence on the Internet is Growing While Confidence in However, only a relatively small percentage of Internet Security is Low and Forecast to Drop to 25 percent Over the Next companies are willing to openly discuss breaches— Five Years. an above-ground issue that CEOs need to address. (See Exhibit 2). Source: Accenture Research 10 SECURING THE DIGITAL ECONOMY
Exhibit 2: S&P 500 CEO Sentiment Toward Cybersecurity (Based on Transcripts from 11,418 Earnings Calls) 125 490 117 113 115 Sentiment Change (2013 = 100) 106 440 103 Number of companies 100 101 105 378 383 390 358 368 95 25 26 345 25 24 85 340 28 294 353 357 75 290 18 333 344 317 65 276 240 55 2013 2014 2015 2016 2017 2018 Company mentions of cybersecurity Company mentions of security breaches Positive sentiment toward cybersecurity Note: Each year is computed as trailing 12 months from September of the previous year to August of the current year. For example, 2018 includes data from September 2017 to August 2018. Source: Accenture Research 11 SECURING THE DIGITAL ECONOMY
The Internet Just Can’t Keep Up How did today’s problems of Internet security As the Internet evolved from a connections among services originate? The Internet was not initially designed to military asset to an open providers, countries and address issues like perpetually increasing levels of infrastructure, security continents. But BGP traffic is complexity and connectivity. It was developed to considerations, such as they vulnerable in transit. In 2017, enable high levels of data sharing, which requires trust. were, focused on preventing traffic to and from 80 Internet physical failures. service providers (ISPs) was Researchers during the Cold War aimed to build a briefly routed to an unknown trusted communications network underground that Today, many of the base Internet Russian operator, showing how could withstand a nuclear attack. Their concerns protocols—the set of rules easy it is to reroute information, did not include preventing cyberattacks, largely embedded in code so all whether intentionally or because modern forms of cyberattack did not exist machines on a network or series accidentally.7 at the time. of interconnected networks “speak” the same language—are Other systems widely utilized on unfit for current demands and are the Internet, such as the Domain insecure. This has led to Name System (DNS) and the increasing challenges below Public Key Infrastructure (PKI), ground that CEOs should which underpins much of the address. encryption utilized on the Internet today, are similarly vulnerable to Consider the Border Gateway potential attacks. Protocol (BGP), a protocol that has been in use since 1994. BGP routes traffic through cables and 12 SECURING THE DIGITAL ECONOMY
The IoT Effect More recently, the rise of the IoT has expanded The casino had an Internet- While the IoT has increased the surface area of attack for enterprise networks connected fish tank that fed the digital capabilities, improved from thousands of end points—including remote fish automatically and efficiencies and unleashed devices, such as mobile phones and laptops—to monitored their environment. growth opportunities for a wide several million for the largest companies. variety of industries, it has also Hackers managed to use the suddenly created complexity for At the same time, the IoT compels all companies fish tank’s connection to break all businesses, leaving them to suddenly manage what are often unfamiliar into the fish tank monitor and more vulnerable. technology processes, where every connected then use this as an entry point device is a potential vulnerability. into the company’s systems. Take the case of an attack suffered by a North The data was then sent to American casino. hackers in Finland.8 13 SECURING THE DIGITAL ECONOMY
Identities in Crisis The “most fundamental challenge” might want to provide, or risk have not invested in the capabilities needed to facing business and society is providing services to someone verify that data. around identity, according to Amit who has stolen another’s identity.” Mital, founder of Kernel Labs and Most individuals who use the former chief technology officer Internet have multiple online (CTO) at Symantec. But the identities; the average Internet challenge of authenticating user today manages 27 identities and confirming the passwords, up from six in 2006.9 integrity of data on the Internet None of us really know what’s happening also presents a key opportunity for In this environment of content out there. We have no idea how our data is the C-suite to renew trust in the over context, Internet users have digital economy. less ability to ascertain the origin being used. I think that’s the key issue and of material they access and we’re [only] seeing the tip of the iceberg Mital comments: “No individual whether it is valid. Facebook, for with recent data breaches being has a single identity that they use example, closed nearly 300 announced.” in the digital world. This million accounts, or 14 percent of fragmentation requires too much Norman Frankel, chairman of the UK-based all accounts, in 2018 after effort for the individual to ensure iCyber-Security Group determining that they were fake.10 consistency, reliability and security. As a service provider, if I And although 79 percent of the cannot trust in the digital identity executives we surveyed believe of a person, then that precludes companies are basing their most me from providing services that I critical strategies on data, many 14 SECURING THE DIGITAL ECONOMY
No Flow Versus Free Flow The Problem of Digital Fragmentation Another key challenge that demands the attention of CEOs is the increasing fragmentation of the Internet. This trend, fueled in part by security concerns, could by itself stunt future global 80 economic growth. Walled gardens— isolated, secured information systems—are 70 64 proliferating as countries and regions limit the free flow of data across borders 60 through regulations. 48 50 Already 13 countries, accounting for 37 34 Article counts (’000) 58 percent of the global GDP, have some version of these regulations.11 Heightened 40 30 concerns about borderless cyberattacks, 30 coupled with geopolitical tensions, 17 20 13 13 threaten to result in even greater 6 9 restrictions. (See Exhibit 3). 10 4 Business leaders are already dealing with 0 this reality as they tailor global operating 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 models to countries with more restrictions. Exhibit 3: Digital Fragmentation Media Coverage Source: Factiva and Accenture Research Analysis. Factiva search based only on “digital fragmentation”, “splInternet”, “balkanization”, “Internet balkanization”, “cyber war”, “cyber attack”, “data breach”, “data leak”, “cyber threat”, “cyberthreat” as keywords among major global business publications. 15 SECURING THE DIGITAL ECONOMY
The Cost of Insecurity For CEOs, one of the most glaring Exhibit 4: Value at Risk* by Industry—Direct and Indirect Attacks challenges of an insecure Internet (Cumulative 2019 to 2023, US$ Billion) is the economic cost. In the private sector, over the next five years companies risk 23% Data in 753 losing an estimated US$5.2 US$B Indirect attacks trillion in value creation 642 opportunities from the digital economy—almost the size of the 505 economies of France, Italy and Spain combined—to $5.2Tr 385 347 347 340 cybersecurity attacks. (See 305 283 Exhibit 4). 257 223 219 This translates to 2.8 percent in 206 lost revenue growth for the next 77% 147 110 70 Direct attacks 47 five years for a large global company. High-tech industries face the highest risk, with more High Tech Life Sciences Consumer Goods and Services Banking Health Retail Insurance Industrial Equipment Communications & Media Natural Resources Utilities Energy Travel Automotive Chemicals Transportation Capital Markets * Expected foregone revenue cumulative over the next than US$753 billion hanging in five years. Calculations over a sample of 4,700 global the balance. public companies. Source: Accenture Research 16 SECURING THE DIGITAL ECONOMY
Keeping Tabs on Cybersecurity Investments CEOs are stepping up their 59 percent of organizations say Exhibit 5: Venture Capital Investments in Cybersecurity spending on cybersecurity to the Internet is becoming (Cumulative Data) protect their businesses. In its increasingly unstable from a latest security forecast, Gartner cybersecurity standpoint and they 70 5,000 projects that such spending was are not sure how to react. While more than US$123 billion for some companies aren’t spending 60 4,123 4,000 2018 and will grow by enough, others may be spending 50 3,491 10.8 percent per year to nearly excessively in response to their 2,731 3,000 US$170.5 billion by 2022.12 low tolerance for cybersecurity 40 33.1 2,148 risk. Others spend in the wrong 27.2 The rising Internet security market 30 1,641 areas, including projects that do 2,000 18.9 is also a hot area for venture capital 1,155 not deliver effective risk reduction. 20 800 14.8 investors, attracting almost US$33 499 10.5 1,000 287 7.1 billion to 2,479 security startups Increasing a company’s 10 109 3.2 5.0 1.7 since 2009, exceeding cybersecurity budget may not be 0 0.7 0 investments in blockchain, which the answer, according to 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018* have surged with the interest in 61 percent of CEOs who believe business applications and that the security issues of the Number of deals Investment amount (US$B) cryptocurrencies. (See Exhibit 5).13 digital economy are far too big for their organization to handle alone. Will spending more on * As of November 2018 And 86 percent believe that taking cybersecurity lead to a secure Note: CB Insights defines cybersecurity as tech-enabled companies that offer products and services for which the business resiliency to the next primary use case is the protection of digital and physical assets from unauthorized access and malicious use by digital economy? In our survey, cybercriminals. level requires an ambitious new Source: Accenture Research Analysis on CB Insights Data vision for the Internet. 17 SECURING THE DIGITAL ECONOMY
STEPPING UP TO MAKE A STAND How CEOs Can Help Create Digitally Secure Business Models 18 SECURING THE DIGITAL ECONOMY
The oil and gas industry analogy helps reveal the types of actions CEOs can take to ABOVE GROUND address security issues. In the same way that Leaders can do their part to build a secure Internet through industry- oil executives divide their focus between wide standards and best practices. CEOs can step up their governance engineering and technological innovations efforts, forging collaborative relationships with peers, government representatives, regulators and industry association leads. Leaders can below ground to advance oil and gas drilling, also embed the idea of a trustworthy digital economy in the vision for and above ground to develop appropriate their company’s business architecture, ensuring that security is business strategies, CEOs need a two- prioritized within the boundaries of their company and throughout its pronged view of the Internet security issue. ecosystem of partners, suppliers and end users. To secure a trustworthy digital economy, above ground is where CEOs can own and BELOW GROUND drive the issue through business initiatives, Technology investments—in everything from devices to cables and including decisions affecting business networks—present decision-makers both inside and outside companies models and ecosystems. that control Internet functionality with the opportunity to build a more trustworthy digital economy. CEOs can influence and inspire technology investments that improve Internet infrastructure, but CEOs of some technology companies are in the position to apply specific technological solutions. CEOs that pay to use the Internet as a utility can understand the vulnerabilities from new technologies and influence how the Internet service is delivered securely to them. For example, they can influence investments to update the Internet’s basic protocols and networks. Meanwhile, CEOs leading companies that build and own the infrastructure and equipment can ensure their products and services are equipped to handle digital business growth and can address the vulnerabilities that new technologies introduce. 19 SECURING THE DIGITAL ECONOMY
ABOVE GROUND: BUSINESS INITIATIVES
Governance Join Forces with Other Companies and Govern Globally First, CEOs can take the lead above ground in One venue already dedicated to likely to join or lead efforts to Internet governance. Of our C-level respondents, this goal is the World Economic ensure the trustworthiness of the 90 percent agree that more secure transactions Forum’s Centre for Cybersecurity. Internet economy. (See Exhibit 6). will not only benefit businesses, but also Launched in 2018, the Centre But no organization should need consumers, government and other stakeholders. seeks to bring partners from a “wake-up call” to join an effort “business, government, It’s in the enlightened self-interest of large that results in effective guidelines international organizations, businesses to extend themselves to help build a and standards and influences the academia and civil society to secure Internet. development of smart enhance and consolidate regulations. When leaders realize To do so, CEOs should collaborate with other top international security.”14 that prioritizing a trustworthy executives and also, where possible, with Many companies are discovering digital economy is a win-win governments and regulators. firsthand that they can’t address situation, businesses, consumers Internet security alone. Our and governments will all benefit survey found companies that through collaboration. have experienced 50 percent or more of their breaches from indirect attacks—targeted at their organization but initiated through partner organizations—are more 21 SECURING THE DIGITAL ECONOMY
Exhibit 6: Likelihood to Join or Lead an Organized Effort to Govern a Create an Internet Security Code of Trustworthy Internet Economy Ethical Conduct for Each Industry A vulnerability in a pacemaker or As a first step to that end above in an avionic system can have ground, CEOs should promote X2 serious consequences. Yet the the need for ethical codes of X2 software professionals who conduct for software develop them are not required to professionals for their industry. attain professionally recognized accreditations similar, for 86% example, to those required of 48% surgeons or pilots. Code safety, 45% ethics standards and 27% 29% certifications are overdue. 21% 24% The creation and maintenance of of our respondents believe that in a trustworthy Internet will require the next three years Less than 24% breaches 24%-49% breaches More than 49% breaches a formal educational system, organizations in the same through which software from indirect attacks from indirect attacks from indirect attacks industry will work together more designers, solution architects, to improve resilience for their computer engineers and code sector. Definitely Extremely developers can stay abreast of would join likely to lead their evolving responsibilities. Source: Accenture Research 22 SECURING THE DIGITAL ECONOMY
Be Proactive with Principle-based Standards CEOs should not wait for another source to produce an ethical guide or related, principle- Devices to ensure product Networks to help ensure secure based standards. Choosing to proactively propose transparency, the ability to make connection to consumers, help their own business-relevant, principle-based software updates and successful them in device configuration and standards is a more expeditious path. pre-release testing and basic inform them about infrastructure CEO guidance can, in fact, influence regulators to offline functionalities. infections. put in place standards that can apply to existing and future technologies instead of myriad detailed rules specific to each new technology Data to limit unnecessary data Protocols to provide authentic development. For example, two-factor collection or usage,15 anonymize routing information and reduce authentication to access banking services was data, enable users to control their domain name hijacking. already the industry standard in several markets data and make it clear to before European regulators required it. customers that their data is being stored and used responsibly.16 CEOs—especially those of device manufacturers, digital platforms and software and telecommunication providers—are uniquely Algorithms to ensure positioned for this more business-friendly approach transparency, auditability and and have a responsibility to discuss design security fairness.17 standards for the following: 23 SECURING THE DIGITAL ECONOMY
Promote Consumer Control of Digital Identities Advocating for individual control of data is more centralized system, a single challenging unless clear rules are than a good public relations move. Of our C-level organization establishes and in place and identity can be respondents, 86 percent say that their manages the identity system. For ascertained—for example, by organization’s access to digital identities is example, with Estonia’s e-identity using blockchain technology. important to its ability to offer innovative customer system, citizens are able to As the World Economic Forum solutions. And 87 percent of C-level respondents provide digital signatures and noted in a September 2018 recognize that customers should have the right to access a range of services using study,18 whatever model prevails, decide how to help secure their digital identities. their ID cards (which have digital identities are deeply Maintaining the trust of customers and protecting encrypted chips), Mobile-IDs (in embedded in daily activities, their digital identities is paramount to the growth of which people use a phone) or leading to greater complexity and the digital economy. Smart-IDs (which require only an responsibility. One thing is clear: Internet connection, no SIM CEOs can’t afford to stay out of above-ground There will be mounting pressure card). As the Estonia example debates that are already starting to take place. for control over personal identity demonstrates, centralized Regulators are discussing how countries and data to gravitate toward individual systems can be built with specific regions must protect people’s digital identities and users. Educating customers and purposes in mind to give users themselves are becoming increasingly the general public about how to controlling organizations such as concerned about their online privacy. In the United protect and use personal governments the ability to vet States and Europe, lawmakers have already information shouldn’t be identity data. proposed or enacted regulations over consumer overlooked. Being a champion of data privacy and Internet security. The alternative model is privacy and responsible decentralized and requires the management of digital identity There are two models of digital identity that CEOs contribution of multiple entities. combines sound business and should consider as influential in the discussion. In a Its governance is more corporate citizenship practices. 24 SECURING THE DIGITAL ECONOMY
Commit to Sharing Information About Cyberattacks; Help Reduce the Stigma With the heightened scrutiny on When a company is willing to the response to cyberattacks— acknowledge an attack, it paves whether they are far-reaching or the way for more transparent not—in the long run, transparency work with other organizations Of our survey respondents, will build trust with everyone from and experts, improving their 85% suppliers to customers. ability to resist new attacks and boosting data reliability. Otherwise, businesses run the risk of encountering “trust Consider this: incidents,” which the Accenture In 2018, UK-based BT created an already keep a careful eye on the latest security Strategy Competitive Agility Index online portal, the Malware issues emerging in the Internet economy. shows can have a negative effect Information Sharing Platform Increased transparency will make those efforts on the bottom line.19 (MISP), to share information more valuable. To reduce the stigma from about malicious websites and encountering these trust software with other Internet incidents, leaders can commit to service providers—a pioneering sharing information about move for a telecommunications successful attacks and breaches. major. It went on to sign a deal with Europol to share knowledge about cyberthreats and attacks.20 25 SECURING THE DIGITAL ECONOMY
Business Architecture Connect and Protect with a Business Model That Runs on Digital Trust To decrease the likelihood that security measures As Michael Hermus, founder and They should be considered can be compromised, CEOs can make the concept CEO of Revolution Four Group and essential, as internal staff—either of a trusted digital economy an explicit part of their former CTO of the United States by mistake or with malicious organization’s business model. That commitment to Department of Homeland Security, intent—account for a sizable make security a foundational requirement should told us regarding the vigilance that share of breaches. But they’re also reach through the company’s entire value CEOs should embed throughout a also insufficient on their own. chain—to every partner, supplier and customer. It company, “You don’t necessarily Alone, they are not nearly an takes just one click to court disaster, and that click trust something because it looks adequate defense in the age of can occur inside or outside the company’s walls. friendly, but you really need to mobility and cloud technologies. That’s why companies need multiple layers of control know exactly what it is, who it is That’s why it is also important to to create a system that runs on digital trust, where and where it’s coming from.” take additional measures, access is given only to people who need it, wherever including articulating a security The first steps toward a model that they are. by design vision, holding line of ensures this trust occur within the business leaders accountable for To ensure a trustworthy digital economy, CEOs can boundaries of the organization. security, bringing CISOs to the embed security into their business architecture—their These steps cover the basics— board and closing off areas of company’s business model and value chain, including security’s low-hanging fruit (as exposure throughout the their leadership structure. detailed in the appendix, Become company’s value chain. Brilliant at the Basics). 26 SECURING THE DIGITAL ECONOMY
Prioritize Make Line of Business Security By Design Leaders Accountable for Security Security can’t be an “add-on” Although it may seem like a Adjusting a company’s remuneration system can feature for products and services. drastic step, CEOs who take this underscore the urgency of cybersecurity concerns to Instead, CEOs should articulate a path probably won’t be alone. leaders who are frequently rewarded for short-term vision of “security by design” financial results. In fact, 83 percent of our survey from the earliest stages of respondents agreed that Companies can align the individual, short-term development, even in the face of organizations must recognize the incentives of business line managers to the longer- pressure for short-term trade-off between time to market term cybersecurity interests of the company. performance. and ensuring secure, sustainable One major multinational bank has strengthened This requires additional growth through technology—and cybersecurity by including the company’s long-term investment at each stage of always choose secure growth. cybersecurity interest as a factor for calculating the development, but these costs bonuses of the leaders of all lines of business. often pale in comparison next to the cost of fines, recalls, lawsuits and loss of consumer confidence that companies will eventually face if they don’t embrace security by design. 27 SECURING THE DIGITAL ECONOMY
Bring a CISO to the Board About two decades ago, as the IT Their area of responsibility has Recruiting a CISO or former CISO to department left the back office to become too important to be the board provides the opportunity establish itself as the nervous confined to a single department to educate fellow board members, system of a business, chief or buried deep in the CIO helping them become more cyber- information officers (CIOs) started organization. savvy and better risk managers. to appear on corporate boards. One United States bank has The CISO would gain a deeper Likewise, chief information already elevated a retired CISO to perspective on the organization. As a security officers (CISOs) today can the board, forging a path for result, the CISO could increasingly follow a similar evolutionary path. others to follow. articulate how cyber risks intertwine with other risks and inform leaders’ Managing cybersecurity doesn’t strategic decisions. mean simply avoiding software problems. It means ensuring the resilience of the entire business. 28 SECURING THE DIGITAL ECONOMY
Protect the Entire Value Chain Based on our analysis, we estimate that if all Of the corporate leaders surveyed, companies collaborate to impose high standards on partner organizations, businesses can expect to save up to US$2.6 trillion. This means that CEOs should ensure that their vision is taken into account in each interaction their company has with suppliers, clients and all other parties in their value chain. In practice, this should 82% 62% note that it is difficult to control agree that it is the responsibility translate into a constant vigilance with the indirect cyberattacks that are of large organizations to foster a trustworthiness of each of the company’s targeted at their organization but digital ecosystem that includes connections. initiated through partner small and medium businesses to John Clark, professor of computer and information help them operate in a organizations. systems at the University of York, explained the trustworthy digital environment domino effect of a lack of trust in one sector on in the interests of all. another. “It just contributes to the denigration of trust overall rather than just in a specific application or location,” Clark said. Just as CEOs can take tangible measures to limit the far-reaching effects of cyberattacks in their ecosystem, they have other key opportunities to protect trust for the digital economy as a whole. 29 SECURING THE DIGITAL ECONOMY
BELOW GROUND: INTERNET INFRASTRUCTURE
Technology Advance Businesses and Enhance Safety Through Technology Inside and outside the technology sector, all CEOs have a role to play when it comes to the technology for a secure Internet. The CEOs who oversee technologies powering As tech leaders, we have to step up and get and protecting the Internet can deliver solutions securely below ground—for the Internet’s basic in the middle of these issues. We cannot protocols, devices, advanced networking and wait for governments to solve them. computing. Companies who compete with each other But all CEOs can ensure the growth of the digital need to put that aside to bring our economy by demanding a safer, more crime- experience together to help us get at this resistant Internet for their business. problem.” Chuck Robbins, CEO of Cisco, addressed this Chuck Robbins, CEO, Cisco21 opportunity in his remarks at a recent World Economic Forum event. 31 SECURING THE DIGITAL ECONOMY
Resolve Vulnerabilities in Basic Internet Protocols Realizing long ago that the main line of defense Because this is a highly technical Investments in new protocols against cybersecurity doesn’t take place at the issue, the biggest impact of the produce benefits only if enough end points (personal computers, mobile phones majority of CEOs will be to networks choose to invest. and IoT devices), the technology community has influence Internet service CEOs are in a position to proposed solutions to add security to the base providers—and others who influence Internet service Internet protocols. manage hardware—to upgrade providers as a first action to make systems against vulnerabilities. For example, to solve the vulnerabilities of the the Internet more secure and to Domain Name System (DNS), a technology called As the IoT age continues to invest in implementing better DNS Security Extensions (DNSSEC) digitally “signs” proliferate end points, the base Internet protocols. The data so a user knows it’s valid. Internet will require an alternative leverage of a CEO to influence to Transmission Control Protocol below-ground activities should (TCP)—a system that sends data not be underestimated. packets over networks on the Internet—to support offline sessions and provide a secure alternative for multiple devices that were previously sharing an IP address. 32 SECURING THE DIGITAL ECONOMY
Heighten Security at the Edge The edge computing universe—including servers, Software development life cycles, As the example of Tesla mobile phones, IoT devices—represents a including those developed by the demonstrates, technology CEOs revolutionary stage of the Internet to analyze data National Institute of Standards can make greater use of network in real time. and Technology (NIST), are being architectures to more quickly modified to ensure that software detect and mitigate edge- Instead of sending data across long routes and security and update functions are related threats. processing it in a centralized data center or the embedded from the beginning. Cloud, it’s processed near the edge of a computer Through collaborative work with network where data is generated. Following a 2016 vulnerability in cross-industry coalitions, they Tesla’s WiFi and onboard can develop standards for edge But the variety of devices computing at the edge entertainment system, Tesla not devices, establish certification means security practices are inconsistent across only patched the bug via over-the- frameworks similar to technologies. Indeed, 86 percent of our air updates but also implemented international mobile phone respondents agree that security needs to be a code-signing policy under which standards and incentivize the embedded into technology, particularly with regard all firmware in cars needs to be ongoing adoption and evolution to the IoT and Industrial IoT (IIoT). validated and verified. of security innovation. Today, Tesla implements dozens of safety and security measures annually; its cars do not carry model years, reflecting the idea that cars are evolving into devices that can be improved regularly.22 33 SECURING THE DIGITAL ECONOMY
Embrace the Advantages Tackle the Question of Software-Defined of Quantum Networking Software-Defined Networking (SDN) is a maturing No longer science fiction, quantum These points generate much architecture that creates dynamic network computing exploits the laws of uncertainty about the future of environments that exist for the limited time quantum mechanics to process cybersecurity. The most productive required to complete specific tasks. information with quantum bits, or course for CEOs is to move ahead qubits, instead of manipulating long with current security activities and Its short-lived nature makes network end points strings of bits encoded as a zero or stay informed of the evolution of difficult to identify and the network pathways one. Opportunity areas for quantum quantum computing. In practice, harder to find and attack than those of traditional computing could be in fraud leaders can position themselves for fixed network solutions. detection for financial services, quantum-resistant encryption by SDN improves network control by enabling Internet supply chain and purchasing, appointing a working team of service providers and other businesses to respond advertising scheduling and “quantum monitors” to identify quickly and cost-effectively to high-bandwidth advertising revenue maximization where the technology is most likely demands. It also automatically enables “ring- for the media industry.23 to impact their business security. fenced” data centers if it detects malicious Accessing emerging application There is no agreement about when activities, limiting the chance of contagion. programming interfaces (APIs) will a quantum computer that surpasses enable businesses to develop pilots While some CEOs may be deterred by the cost of the capacity of a traditional for quantum-based optimization, deploying SDN, those of large companies could computer will be available, but two sampling and machine learning. have the resources to contribute to this technology. things are clear. First, quantum Through such pilots companies can Others can “inspire and influence” its development computers will provide a significant test, learn, iterate and stand ready. for the benefit of all. boost to the world’s computing power. Second, they will be able to more easily break most current encryption methods. 34 SECURING THE DIGITAL ECONOMY
PAVING THE WAY FOR A TRUSTWORTHY DIGITAL ECONOMY
Today’s security strategies are, in large part, The actions of CEOs— By embracing and still responding to yesterday’s challenges. driving above ground and developing technologies that From reports of exposed personal influencing below ground— can advance their businesses information to data misuse, trust incidents matter. and enhance digital safety, are becoming increasingly visible to the CEO engagement can drive a By joining forces with other public. Regaining lost trust is an uphill trust turnaround for the CEOs, public sector leaders battle. And many CEOs aren’t aware of its Internet and secure the and regulators, they can value until it’s too late. future of the digital economy. develop much-needed Our research shows businesses can guidelines and oversight quantify the impact of a trusted digital mechanisms. economy on the bottom line, and By protecting their own 90 percent of our respondents say a organization and extending trustworthy digital economy is very or protection through its value extremely critical to their organization’s chain, they will safeguard future growth. the business ecosystem. 36 SECURING THE DIGITAL ECONOMY
APPENDIX
Become Brilliant at the Basics Adopting Best-in-Practice “Cyber Hygiene” Techniques Means Becoming Brilliant at the Basics, Including: Training people Protecting against phishing Patching When a company starts using technology that Hackers often use social Unfortunately, when a company many or even most of its relevant employees don’t engineering tactics, such as detects a vulnerability, the fix is understand, the firm is bound to suffer from lost phishing, to attack companies, so often put off until security opportunities or higher cyber vulnerabilities—or training to avoid falling in this trap managers and staff “have time.” both. Security will be determined by the company’s is especially important. Now is the time to prioritize fixing weakest link; often that is an employee who any detected weaknesses. inadvertently presents the opportunity for a breach. Yet systematic training is, in general, still Passwords not accepted as a basic practice, even with attacks increasing in frequency, size and scope. Incentives Though it sounds obvious, many are also important: Some companies are linking companies still struggle with the executives’ remunerations to security. implementation of cybersecurity basics, such as sound password policy. Multifactor authentication should be the default option for every business. 38 SECURING THE DIGITAL ECONOMY
The Value of The Expected Cost of Cybercrime Cybersecurity for Businesses and Society We began by estimating the expected cost of cybercrime in terms of revenue for a company of a The industry average number of days it takes to fix given size in a range of industries. We measured the damage caused by an attack and the average number Many have talked about the costs value exposed, considering the risk of small (less of attacks in a year, sourced from the survey report of cyberattacks, but what about than 90,000 records impacted) and big (more than “Gaining ground on the cyberattacker: 2018 State of the other side of the coin? How 90,000 records impacted) attacks and the Cyber Resilience.”24 might better cybersecurity probability of their occurrence. Revenues by practices create value for company size and industry were sourced from We drew the estimated cost of a big attack from our businesses and society? Capital IQ. Calculating the cost of small attacks event study, described below in the section entitled required the following elements: “The impact on revenue of a big, public event.” We Driven by understanding both sourced the probability of a big event from Ponemon the cost of crime and the Institute data for the Accenture 2018 Cost of potential of a trustworthy digital Annual costs of cybercrime by company size and Cybercrime study. The findings of our survey economy, we conducted our industry, sourced from Ponemon Institute data for the (conducted for this study) provided the portion of analysis in three steps. Accenture 2018 Cost of Cybercrime study. attacks coming through third parties. Probability of Probability of Expected cost x Cost of + x Cost of big of cybercrime = facing small attacks small facing big attacks attacks attacks Expected cost of Expected cost small attacks of big attacks 39 SECURING THE DIGITAL ECONOMY
The Value at Risk for Businesses The Economic Picture for a Trustworthy Internet Next, we estimated the expected Company revenues were sourced Finally, we analyzed how an increase in companies’ cyber resilience and value at risk by industry. We from Capital IQ. Revenue the trustworthiness of the Internet could translate into less value at risk calculated the total industry forecasts for the 2018 to 2023 for business and society. We modeled econometrically how companies’ revenues and multiplied those period were obtained by lower vulnerability, measured by the number of attacks suffered and the figures by the expected cost of extrapolating current revenues number of days it takes to solve an incident, reduces the cost of cybercrime. forward, according to the 2011 to cybercrime after the introduction of better cybersecurity practices. We 2017 CAGR from Capital IQ data. then estimated how this gain translates into value for society. The sample consisted of 4,700 companies. These were publicly We estimated an econometric model to calculate the probability for a listed companies with more than company of (a) receiving a certain amount of attacks and (b) solving a 250 employees, operating in the data breach within a certain period of time. industries under scope and The data set comprised 4,500 companies in the Accenture 2018 State headquartered in the countries of Cyber Resilience survey.25 The explanatory variables included: 1) the under scope. percentage of spend in cybersecurity over total IT spend; 2) whether companies impose high standards on business partners, and; 3) whether companies had made significant cybersecurity investments in Company Number of the prior six months. Value at risk average x companies in our We used the estimated coefficients to recalibrate the Value at Risk Expected revenue sample for = cost of x Model and formulate an alternative scenario in which every company: businesses cybercrime 1) regularly (every six months) makes significant investments in Total industry revenue pool cybersecurity; 2) invests as much as the top 20 percent of performers in cybersecurity; and 3) imposes high standards on business partners. 40 SECURING THE DIGITAL ECONOMY
The Impact on Revenue of a Big, Public Event We identified unique cyberattacks In the event of negative Exhibit 7: Big and Public Cyberattack Impact on Revenue that were publicly announced by cybersecurity events, revenues the companies attacked using experienced a decline. To identify Breachlevelindex.com by Gemalto. a causal effect, we created a 120 Breachlevelindex.com collects control group composed of the information of all public attacks top 10 peers (as defined by S&P 115 since 2013. Each attack is assigned Capital IQ) of each breached a risk level from 1 to 10, where company. Under the assumption 110 Revenues (Event quarter Revenues = 100) Companies not suffering an attack events above a risk score of 5 are that the control group was not classified as critical to severe. breached, we used an event study 105 methodology (diff-in-diff We collected all the events that estimation) to compare the two 100 had a risk score above 5, then we sets of companies and calculate excluded events related to 95 the percentage change in government agencies and revenues, comparing eight Companies suffering an attack universities. Our final sample 90 quarters before and after the included 460 unique events and event. 436 unique companies. Among 85 them, approximately 80 are publicly traded. For these 80 -8Q- 7Q -6Q- 5Q -4Q- 3Q -2Q -1Q Event 1Q 2Q 3Q 4Q 5Q 6Q 7Q 8Q companies, we collected revenues information from S&P Capital IQ. Source: Accenture Research 41 SECURING THE DIGITAL ECONOMY
Transcript Analysis We identified cybersecurity Our model uses a long short-term memory Our transcript analysis was based mentions by checking for certain neural network (a deep learning NLP model that keywords (and possible accounts for word order and context) to identify on transcripts of earnings calls of combinations of those keywords) a company’s strategic orientation and long-term companies present in the S&P 500 in each sentence in the focus, and the clarity of its strategic vision. as of October 1, 2018. transcripts. When we found a To develop our AI, 900,000 sentences were match, we marked the sentence We collected 11,418 unique randomly selected. This set was further split as being cybersecurity related. transcripts from S&P global, We used the following keywords: into three subsets: covering a time frame from cybersecurity, cyberattack, September 1, 2012, to cyberthreat, cybercrime, cyber a training dataset (80 percent), August 31, 2018. incidents, cyber intrusions, cyber theft, cyber fraud, Text data was analyzed using two malicious cyber activity, adverse a testing dataset (15 percent) and different algorithms: one to cyber event, data leak, data identify mentions and discussion breach, malware, ransomware, about cybersecurity; and another spyware, IP theft, DDoS attack. a cross-validation dataset (5 percent). to calculate the intended strategy Using a proprietary neural Subsequently we applied the estimated model toward cybersecurity. network algorithm that captures to all the sentences from our transcript dataset. a company’s attitude toward cybersecurity, we then calculated an intended strategy. 42 SECURING THE DIGITAL ECONOMY
Acknowledgments Authors Project Team We would like to thank the following business leaders, experts and practitioners for their valuable insights during our interviews and Omar Abbosh Edward Blomquist conversations: Kelly Bissell Tomas Castagnino Jay Best Per Gustavson Francis Hintermann Information Security Expert, Crypto Strategy Advisor, Itsa Ltd. Lynn LaFiandra GDPR, Göteborgs Stad Research Lead laine Bucknor E Ryan LaSalle J eff Hancock Luca Gagliardi CISO, Sky TV Co-Founder and Chief Regina Maruca J ohn Clark Operations Officer, getFIFO Vincenzo Palermo Professor, Computer and Information uhittin Hasancioglu M Tom Parker Systems University of York Former VP and CISO, Royal Dutch Eduardo Plastino fonso Ferreira A Shell plc Professor, Director of Research, CNRS - Virginia Ziegler ichael Hermus M Toulouse Institute of Computer Science CEO & Managing Partner, Research Revolution Four Group, LLC Norman Frankel Naoki Kamimaeda Chairman, iCyber-Security Investor, Mad Street Den 43 SECURING THE DIGITAL ECONOMY
Arthur Keleti Adam Segal IT Securities Strategist, T-Systems Director of the Digital and Cyberspace Policy Program; Council on Foreign JJ Markee Relations CISO, KraftKeinz PW Singer Amit Mital Senior Strategist; New America CEO at Kernel Labs Holding Llc, Former CTO Symantec Corporation George Smirnoff CISO, Synchrony Peter Morgan Founder and CEO at Deep Learning John Valente Partnership CISO, The 3M Company Tony Sager Uwe Wirtz Senior Vice President and Chief Evangelist, CISO, Henkel CIS (Center for Internet Security) 44 SECURING THE DIGITAL ECONOMY
You can also read