Captive.com logo

Captive Insurance News

Corporate Governance: Free Survey Report

Corporate Regulation and Governance in Captives

A FREE 24-page special survey report from Captive.com

Delve into captive insurance governance matters including board attributes, board structure, and board accountability. With 30 years of insurance experience from the auditing, regulatory, and management side, Derick White, managing director of corporate governance and regulation for Strategic Risk Solutions, offers key insights into captive board governance.

Show Me My Free Survey Report

Intelligence Sharing Across Organizations Next Step in Cyber Security

Cyber Security-SF
February 22, 2019

Aon recently released its 2019 Cyber Security Risk Report, What's Now and What's Next, which describes the greatest cyber-security threats and challenges now faced by organizations. The report considers that as companies continue to use technology to speed up the transfer of information, game-changing business opportunities are created, as well as increased cyber risk. 

J. Hogg, CEO of cyber solutions at Aon, said, "Our 2019 report shows that organizations must recognize the need to share threat intelligence across not only their own network but with others as well. While it may seem counterintuitive when thinking about cyber security, collaboration within and across enterprises and industries can keep private data of companies and individuals alike safer. Working together can result in improved efforts to hunt bad actors while also raising the bar and making all parties more prepared for the inevitable day when a disruption does happen." 

The report focuses on eight specific risk areas that companies may face in 2019. The risks illustrate how, as organizations transition to a digital-first approach across all transactions, the attack surface of global business expands rapidly and sometimes in unexpected ways. In other words, thanks to the rapid enhancements and constant changes in technology, the number of touch points that cyber criminals can access within a business is growing exponentially.

Those eight risk areas, along with highlights from the report, are as follows.

  1. Technology. While technology has revolutionized the way organizations today conduct business, broader and wider-spread use of technology also brings vulnerabilities. From publishing to automotive, industries are facing new, evolving services and business models. These new opportunities, however, bring with them a radically different set of risks, which organizations will need to anticipate and manage as they continue the digital transformation process.
  2. Supply Chain. Two prevailing supply chain trends will heighten cyber risks dramatically in the coming year. One is the rapid expansion of operational data exposed to cyber adversaries from mobile and edge devices, like the Internet of Things (IoT), and the other is companies' growing reliance on third-party—and even fourth-party—vendors and service providers. Both trends present attackers with new openings into supply chains and require board-level, forward-looking risk management in order to sustain reliable and viable business operations.
  3. IoT. IoT devices are everywhere, and every device in a workplace now presents a potential security risk. Many companies don't securely manage or even inventory all IoT devices that touch their business, which is already resulting in breaches. As time goes on, the number of IoT endpoints will increase dramatically, facilitated by the current worldwide rollouts of cellular IoT and the forthcoming transition to 5G. Effective organizational inventory and monitoring process implementation will be critical for companies in the coming year and beyond. 
  4. Business Operations. Connectivity to the Internet improves operational tasks dramatically, but increased connectivity also leads to new security vulnerabilities. The attack surface expands greatly as connectivity increases, making it easier for attackers to move laterally across an entire network. Further, operational shortcuts or ineffective backup processes can make the impact of an attack on business operations even more significant. Organizations need to be better aware of, and prepared for, the cyber impact of increased connectivity.
  5. Employees. Employees remain one of the most common causes of breaches. Yet employees likely do not even realize the true threat they pose to an entire organization's cyber security. As technology continues to impact every job function, from the CEO to the entry-level intern, it is imperative for organizations to establish a comprehensive approach to mitigate insider risks, including strong data governance, communicating cyber-security policies throughout the organization, and implementing effective access and data-protection controls. 
  6. Mergers & Acquisitions (M&A). Projections anticipate that M&A deal value will top $4 trillion in 2018, which would be the highest in four years. The conundrum this poses to companies acquiring other businesses is that, while they may have a flawless approach to cyber-security enterprise risk, there is no guarantee that their M&A target has the same approach in place. Dealmakers must weave specific cyber-security strategies into their larger M&A plans if they want to ensure seamless transitions in the future. 
  7. Regulatory. Increased regulation, laws, rules, and standards related to cyber are designed to protect and insulate businesses and their customers. The pace of cyber-regulation enforcement increased in 2018, setting the stage for heightened compliance risk in 2019. Regulation and compliance, however, cannot become the sole focus. Firms must balance both new regulations and evolving cyber threats, which will require vigilance on all sides.
  8. Board of Directors. Cyber-security oversight continues to be a point of emphasis for board directors and officers, but recent history has seen an expanding personal risk raising the stakes. Boards must continue to expand their focus and set a strong tone across the company, not only for actions taken after a cyber incident but also for proactive preparation and planning.
Captive Insurance Company Reports
Follow Captive.com on Twitter

Twitter Feed