Risk managers don't have to look far for examples of cyber attacks and the problems they cause. Last year was the worst year to date for data breaches as more than 740 million data files were illegally viewed or stolen from around the world, according to Data Breach Today.
The nature of cyber attacks is evolving. While “point-of-sale” attacks are old news, in today's connected world an attack on a cloud provider is the next type of global breach, according to Zurich.
Click through the slides to learn the seven aggregations of cyber risk, as outlined by Crawford & Co.
1. Internal IT enterprise
Risk associated with the cumulative set of an organization's IT.
Examples: Hardware, software, servers, and related people and processes
Counterparties and partners
Risk from dependence on, or direct interconnection (usually non-contractual) with an outside organization
Examples: University research partnerships, relationship between competing or cooperating banks, corporate joint ventues, industry associations
Outsourced and contract
Risk usually from a contractual relationship with external suppliers of services, HR, legal or IT and cloud providers.
Examples: IT and cloud providers, HR, legal, accounting and consultancy, contract manufacturing
Supply chain
Both risks to supply chains for the IT sector and cyber risks to traditional supply chains and logistics
Examples: Exposure to a single country, counterfeit or tampered products, risks of disrupted supply chain
Disruptive technolgies
Risks from unseen effects of or disruptiosn either to or from new technologies, either those already existing by poorly understood or those due soon
Examples: Internet of things, smart grid, embedded medical devices, driverless cars, the largely automatic digital economy
Upstream infrastructure
Risks from disruptions to infrastructure relied on by economies and societies, especially electricity, financial systems and telecommunications
Examples: Internet exchange points and submarine cables, some key companies and protocols used to run the Internet, Internet governance
External shocks
Risks from incidents outside the system, outside of the control of most organizations and likely to cascade
Examples: Major international conflicts, malware pandemic
Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader
Your access to unlimited PropertyCasualty360 content isn’t changing.
Once you are an ALM digital member, you’ll receive:
- Breaking insurance news and analysis, on-site and via our newsletters and custom alerts
- Weekly Insurance Speak podcast featuring exclusive interviews with industry leaders
- Educational webcasts, white papers, and ebooks from industry thought leaders
- Critical converage of the employee benefits and financial advisory markets on our other ALM sites, BenefitsPRO and ThinkAdvisor
Already have an account? Sign In Now
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.