Hostage to fortune report: ideas to combat ransomware
It has generated a few fleeting headlines, but I think it deserves more of a spotlight. In case you missed it, a very interesting report: “A Hostage to Fortune: Ransomware and UK national security” was published on December 4th by the Joint Committee on the National Security Strategy (JCNSS). This is a UK Parliament body set up in 2010 to consider National Security Strategies (made up from both Houses) to scrutinise policy areas, cross-government processes and structures. This report focuses on the state and impact of ransomware on the UK economy, building resilience, and suggested strategies to manage the threat.
If you haven’t got time to read the 76 page report, I have! Here are my main takeaways, especially with perspective of the cyber insurance industry in mind.
Don’t have time to read this article? ?Here’s the digested read: The UK government is way off track in dealing with ransomware. But, there are opportunities to close the gap with criminals, and a number of policy areas where improvements can be.
Here are the key themes I pulled from the report, together with some closing thoughts on next steps for the cyber insurance industry. ?
Government?Backstop?
One area worth exploring further are the implications for the cyber insurance industry. To quote the report more fully in this area:
领英推荐
“Cyber insurance can provide a vital lifeline for ransomware victims, offering the sort of support and technical advice not offered by state agencies, as well as driving up cyber security standards through conditions of coverage. Unfortunately, there remains a woeful lack of UK coverage: premiums are unaffordable for many organisations and have increased drastically in recent years. There are precedents for more extensive Government interventions, where market failures in insurance have wider societal implications [my emphasis]. Given the losses endured by ransomware victims and the costs to businesses and public finances, there is a strong economic case for the Government to do more. The Government should work with the insurance sector to establish a re-insurance scheme for major cyber-attacks, akin to Flood Re, to ensure the sustainability and accessibility of the market.”
The idea of governments as “insurer of last resort” is not new, and there are numerous examples of sustainable schemes such as for terrorism risk Pool Re in the UK and the Terrorism Risk Insurance Program (TRIP) in the US. Discussions about some type of back stop for cyber risk are over 10 years old in policy circles, but it is only in recent years that these discussions have gained momentum as the recognition of the potential systemic nature of cyber risk has grown. Indeed, in the US there has been public consultation on the topic, including a report by the Federal Insurance Office as part of the Treasury. From a personal perspective, I am broadly in favour of the concept, within certain parameters. As with anything complex issue of this nature, there are several challenges to be mindful of in addressing the goal. These include:
The benefits of an effective government scheme are substantial in providing increased resilience and security for the economy and wider society. It can also act to improve the baseline expectations of security standards and raise awareness of the threats which exist.
In conclusion, it is a timely report on an urgent matter of public interest. The insurance industry has an important role to play, both as a voice in the debate, and in contributing to the solutions.
?
Begun work on my 2nd book. This one is focused on insurance and cyber. 1st book: “Stone Tablets to Satellites: The Continual Intimate but Awkward Relationship Between the Insurance Industry and Technology".
10 个月Good share ..
Next Generation Cyber Risk Quantification
11 个月One element that I think often gets little attention in conversations around a government backstop is the concept of a emergency response capability for large scale catastrophic cyber events similar to FEMA. A capability based on warehouses stocked with routers, network switches, pre-built racks of equipment, truckloads of laptops. Essentially an ability to bring up parallel infrastructure on site to provide disaster operational capability.