Risk managers don't have to look far for examples of cyber attacks and the problems they cause. Last year was the worst year to date for data breaches as more than 740 million data files were illegally viewed or stolen from around the world, according to Data Breach Today.

The nature of cyber attacks is evolving. While “point-of-sale” attacks are old news, in today's connected world an attack on a cloud provider is the next type of global breach, according to Zurich.

Click through the slides to learn the seven aggregations of cyber risk, as outlined by Crawford & Co.

1. Internal IT enterprise

Risk associated with the cumulative set of an organization's IT.

Examples: Hardware, software, servers, and related people and processes

Counterparties and partners

Risk from dependence on, or direct interconnection (usually non-contractual) with an outside organization

Examples: University research partnerships, relationship between competing or cooperating banks, corporate joint ventues, industry associations

Outsourced and contract

Risk usually from a contractual relationship with external suppliers of services, HR, legal or IT and cloud providers.

Examples: IT and cloud providers, HR, legal, accounting and consultancy, contract manufacturing

Supply chain

Both risks to supply chains for the IT sector and cyber risks to traditional supply chains and logistics

Examples: Exposure to a single country, counterfeit or tampered products, risks of disrupted supply chain

Disruptive technolgies

Risks from unseen effects of or disruptiosn either to or from new technologies, either those already existing by poorly understood or those due soon

Examples: Internet of things, smart grid, embedded medical devices, driverless cars, the largely automatic digital economy

Upstream infrastructure

Risks from disruptions to infrastructure relied on by economies and societies, especially electricity, financial systems and telecommunications

Examples: Internet exchange points and submarine cables, some key companies and protocols used to run the Internet, Internet governance

External shocks

Risks from incidents outside the system, outside of the control of most organizations and likely to cascade

Examples: Major international conflicts, malware pandemic

Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader

Your access to unlimited PropertyCasualty360 content isn’t changing.
Once you are an ALM digital member, you’ll receive:

  • Breaking insurance news and analysis, on-site and via our newsletters and custom alerts
  • Weekly Insurance Speak podcast featuring exclusive interviews with industry leaders
  • Educational webcasts, white papers, and ebooks from industry thought leaders
  • Critical converage of the employee benefits and financial advisory markets on our other ALM sites, BenefitsPRO and ThinkAdvisor
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.