100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Resumen

Samenvatting - Cybersecurity & Risk Management

Puntuación
-
Vendido
1
Páginas
13
Subido en
20-10-2023
Escrito en
2023/2024

Very concise summary of all lecture slides Cybersecurity 2023/2024. Non of the papers are discussed in the summary.

Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Estudio
Grado

Información del documento

Subido en
20 de octubre de 2023
Número de páginas
13
Escrito en
2023/2024
Tipo
Resumen

Temas

Vista previa del contenido

Week 1:
Market perspective
- Recommendations (of Larcker, Reiss & Tayan – 2017)
1. Integrate cybersecurity in the company’s risk framework (customer AND corporate
data)
2. Monitor if management and employees take cybersecurity seriously
3. Develop a data breach action plan (incl. board responsibilities)
i. GDPR gives rules to have this
4. Monitor data classification and security policies (incl. director communications,
documents, and conversations).
i. Classification: good way to secure
5. Terminate or reduce/restructure reward of board members and management in case
of cyber impact
i. Focusses only on negative & you not in control, you can always be a victim
6. Increase board cyber savviness (educate & recruit)

Cybersecurity
- Cybersecurity = the protection of cyber systems against cyber threats.
- Cyber threat = a threat that exploits a cyberspace.




o
- Cost benefit analysis




o
- Framework



- Should do: look at several aspects
- All 4 to balance

, - Spooks: governments using tools to protect national interest – including the risk of ending up
in the hands of crooks
- Crooks: botnet herders, malware writers, spam senders, bulk account compromise, targeted
attackers and cash out operators.
- Geeks: experts and researchers that report vulnerabilities – in order to enable fixing the
vulnerability.
- The swamp: focus on person rather than on property, e.g., hacktivism and hate campaigns
- Risk Management – ISO/IEC 27000:2018 – is a protocol for cyber protection. It is updated in
2022, in adaption to new risks. Some new controls were added, there are four theme clauses:
o Organizational
o People
o Physical
o Technology

Cyber Insurance
- Yes/No
o Allows organizations to transfer some of the financial risks associated with cyber
incidents to an insurer
o The financial losses might cost associated with remediation, investigators and crisis
communication
o Most cyber insurance companies are typically insurance companies offering a
broader range of insurance services.
- Trends
o Currently insurers reduce coverage in combination with increasing premiums
o Stop covering the costs of ransom payments
o Increasing minimum cyber security maturity levels (beyond having in place
reasonable security measures?)
o Educate insured organisations
- Going forward cyber-insurance providers will thrive by succeeding in:
o Rewarding security,
o generating knowledge and,
o punishing insecurity while,
o partnering with technology providers how have a deep access to policyholders’ IT
architecture.

Willingness to pay ransom
▪ It is not always legal to pay…
- Not surprisingly: “strong relationship between WTP and concern for data breach, with those
who were concerned about data breach being more willing to pay the ransom”
- 3 basic categories of attitude to paying the ransom:
o Those who would object on principle to giving money to a criminal (28% of
respondents) and those who did not value their files (25%) showed lowest WTP
o Those who would not trust the criminal (20%) or hope to recover their files through
an expert (18%) showed significantly higher WTP
o Those who would pay if the price were right (1%) had highest WTP
- Ransomware – six dilemma’s
1. Are you technically prepared (e.g., back-ups and zero trust approach)?
2. Do you have access to threat intelligence (e.g., open source decryption keys –
researchers and culprit intelligence – researchers & law enforcement authorities)?
3. Do you have a cyber insurance. And what does it really cover?
$6.74
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
IMTIL23
5.0
(1)

Conoce al vendedor

Seller avatar
IMTIL23 Hogeschool Utrecht
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
9
Miembro desde
7 año
Número de seguidores
5
Documentos
5
Última venta
2 meses hace

5.0

1 reseñas

5
1
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes