(Archived Content)
As prepared for delivery
The great value of this program comes in its breadth. Topics covered yesterday ranged from digitalization of financial services to political risk in a rapidly changing geo-political environment. Today you’ll tackle where we are with global regulatory reform as well as competition and collaboration between global financial centers to create economic growth. I would like to add to this agenda by discussing an issue underlying all of these matters; an area that certainly affects global economic recovery and that poses a significant challenge for governments, every organization in the financial sector, consumers, and beyond; and that is cyber resilience.
What does this mean about the pervasiveness and the vastness of the cyber threat? We know that cyberattacks are growing in frequency, severity, and sophistication. Over the past year in the United States we have had a series of high profile attacks against U.S. firms and government agencies. But the United States is not alone. Last fall the accounting and consulting firm PricewaterhouseCoopers released the results of its annual global information security survey of business executives. That survey, which included more than 9,700 participants from 154 countries, reported almost 43 million detected cybersecurity incidents in the prior year, a 48 percent increase over 2013 [1]. The survey also reported the average loss attributed to cybersecurity incidents at $2.7 million—a 34 percent increase from 2013—and noted a 92 percent increase in entities reporting losses of $20 million or more [2]. According to the survey, Europe experienced a more than 40 percent increase in reports of cybercrime, compared to an 11 percent increase in North America [3].
II. The Motives Behind the Cyber Threat: Economic, Geo-Political, and Physical
In some ways it’s helpful to compare malicious cyber activity to our traditional understanding of crime, to understand how this threat affronts and conforms to risks to which we are more accustomed. But unlike our notion of most traditional crime, sovereign borders are no limit for virtual activity. Malicious cyber actors are unhindered by traditional deterrence, and can easily transcend borders using communication and information technology systems. Once embedded in these systems, these attackers assess the critical assets and vulnerabilities of target organizations and individuals. The attackers can stay for days, weeks, months or even years; they need not dash out as soon as the sun comes up or when they hear homeowners pull into their garage. And, unlike a burglar, a cybercriminal faces very little immediate risk of arrest and can reach the same result from the comfort of his home with his laptop and by pressing a couple of keys.
These attacks, against Sony and the steel mill, underscore that along with its immense benefits, cyberspace provides unprecedented access to engage in damaging mischief and criminal activity. Sitting thousands of miles away, attackers can steal, cause physical destruction, and attempt to intimidate and undermine fundamental values and beliefs.
We are certainly developing a shared understanding of the threat; we now need to develop a consensus around ways to responsibly address this threat. In the current global environment of interconnectivity, we have seen a growing consensus around the need to ensure that international legal principles pertaining to state sovereignty, human rights, and state responsibility apply equally to conduct online as well as offline. As part of a broader effort to improve cybersecurity around the world, we are working with the international community to develop common understandings of responsible state behavior in cyberspace.
This is significant work, but it is complex and time-intensive, and any solutions will be sub-optimal if governments act alone. The financial sector, as the provider of intermediation and market-making, and the holder of consumer information, is one critical infrastructure in our global economic landscape. As we all know, the international financial services sector—and this group as leaders of that sector—is making substantial investments to protect the sector, the critical infrastructure supporting the sector, and each other. Much the same way that vaults and guards serve as the first lines of defense against bank robberies—with the police providing powerful second-line deterrence—financial services companies are making investments to protect themselves, their valuable assets, and the assets and information of clients and consumers against cyberattacks.
Rather than thinking of cyber risk as a newfangled technology and security risk, each of us—financial institutions and public institutions—must recognize this risk as perhaps the most pressing operational risk of our time. Of course it is more than just an operational concern. Given the ease of contagion within and across the financial sector and other critical infrastructure, and given the amount of consumer data held within the financial sector, it is also a systemic concern and a reputational concern.
IV. Three Specific Activities that Can Make a Difference Now
While we work toward coordinated inter-governmental efforts and enforcement internationally, and while institutions enhance their cyber resilience by embedding controls and defenses into their cultural orientations—with long-term aspirational goals and investments to be sure—it strikes me that there are also three immediate, shorter-term fixes that can make a difference in strengthening the financial sector’s resilience. These are to share information; to focus on third-party vendors’ security; and to create, what I call, Playbooks for Preparedness.
First, information-sharing should be a priority for the financial sector all over the world [8]. Increasingly, bad actors do not attack a single organization; they instead target multiple institutions using the same or similar methods. That was the case last year with the attack on JP Morgan Chase’s systems; other financial institutions were targeted using the same tactics and techniques.
To facilitate and centralize information-sharing, financial services firms in the financial sector have established a non-profit entity, known as the Financial Services Information Sharing and Analysis Center. That center disseminates threat alerts that it constantly receives, from its approximately 5,500 members and from commercial sources, law enforcement, and U.S. government agencies. This center is not solely focused on the United States though; it has members around the world and just last week had a members’ meeting here in London.
In short, if you haven’t already, think about joining an information-sharing forum like the Financial Services Information Sharing and Analysis Center.
2. Control the Use of Third-Party Vendors
Therefore, as I’ve said in the past, in both the private and public sectors, you want to understand the security safeguards in place at any entities with access to your networks, systems, and data. At the very least, this means: (1) knowing all vendors and third parties with access to your institution’s systems and data; (2) confirming that those vendors and third parties have appropriate protections to safeguard your systems and data; (3) conducting monitoring to ensure these firms are adhering to the particular protections you understand them to have; and (4) documenting protections and related obligations in your contracts so that you can enforce them [10].
Given the sheer number and transforming nature of cyber incidents, we know avoiding every cyberattack is currently a pipe dream. Instead we have to increasingly focus our efforts on making response and recovery more efficient, effective, and predictable.
One key way to proactively prepare for a potential incident is by obtaining cyber insurance. Cyber insurance provides an important risk mitigation tool by allowing policyholders to transfer some of the financial exposure associated with cyber events. But cyber insurance can play another important role. Qualifying for cyber insurance can provide useful information for assessing institutions’ risk level and identifying cybersecurity tools and practices that are missing or that could be enhanced. And for institutions with cyber insurance already in place, they may have a leg up on response and recovery when cyber events occur. This is because insurance companies can help their policyholders navigate the complex processes around cyber response and recovery, and can refer those policyholders to proven experts. The cyber insurance market is relatively new, but it is growing in the United States and also starting to develop in Europe.
Another way for institutions to know that they will be able to respond and recover from a debilitating attack is to develop a cyber-incident playbook—a so-called “Playbook for Preparedness.” These playbooks can be a stand-alone document or part of larger business continuity and disaster recovery plans. Regardless of the specific form, the playbook should have a detailed, documented plan so that the firm can react quickly to minimize internal and external damage, reduce recovery time and costs, and instill confidence in outside stakeholders and the public.
In the United States, the Treasury Department—working with private institutions in the financial sector as well as other departments and agencies throughout government—has participated in joint private-public exercises that simulate broad-reaching cyberattacks. These exercises—designed to be progressively more complex—are designed to help identify gaps in our current cyber incident response framework, and to better inform and drive efforts to improve collective response preparedness. Like fire fighters participating in complex fire drills, these exercises serve as training ground to practice and refine communication and coordination protocols between and among public and private organizations during cyber incidents. At the end of the year we anticipate holding a transatlantic exercise between the United States and the United Kingdom. To the extent possible, I encourage your institutions to look for opportunities to participate in similar domestic and international exercises.
V. Conclusion
Thank you.
1. PwC, Managing Cyber Risk in an Interconnected World: Key Finding from The Global State of Information Security Survey 2015, at 7 (Sept. 30, 2014) (the geographical makeup of survey participants was: 35 percent from North America, 34 percent from Europe, 14 percent from Asia Pacific, 13 percent from South America, and 4 percent from Africa and the Middle East). This increase may also be a result of enhanced detection efforts overall.
2. See id. at 10.
3. See id. at 9.
4. Center for Strategic and International Studies, Net Losses: Estimating the Global Cost of Cybercrime (June 2014) (study estimated annual cost of cybercrime to the global economy as likely to exceed $400 billion, and could range from $375 billion to $575 billion).
5. See, e.g. Die Lage der IT-Sicherheit in Deutschland 2014, Bundesamt für Sicherheit in der Informationstechnik (BSI), Nov. 2014; Robert Lee, Michael J. Assante, & Tim Conway, German Steel Mill Cyber Attack, SANS Industry Control Systems, Dec. 30, 2014, https://ics.sans.org/media/ICS-CPPE-case-Study-2-German-Steelworks_Facility.pdf (including assessment of attack and translation of relevant text from BSI report); Hack Attack Causes 'massive damage' at Steel Works, BBC News, Dec. 22, 2014, available at http://www.bbc.com/news/technology-30575104; Kim Zetter, A Cyberattack has Caused Confirmed Physical Damage for the Second Time Ever, WIRED, Jan. 8, 2015, available at http://www.wired.com/2015/01/german-steel-mill-hack-destruction/.
6. Id.
7. Id.
8. Federal Financial Institutions Examination Council, Cybersecurity Threat and Vulnerability Monitoring and Sharing Statement, at 1 (Nov. 4, 2014) (recommended that regulated financial institutions should participate in cyber risk information-sharing), https://www.ffiec.gov/cybersecurity.htm.
9. Federal Financial Institutions Examination Council, FFIEC Cybersecurity Assessment: General Observations, (Nov. 2014), http://www.ffiec.gov/press/PDF/FFIEC_Cybersecurity_Assessment_
Observations.pdf.
10. Id.