02.02.2022 Views

Cyber Defense eMagazine February Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in D.C., London, N.Y. and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in D.C., London, N.Y. and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Keeping Premiums Low Once Coverage is Secured<br />

Once secured, cyber insurance premiums can be kept low on renewal by continuously improving upon<br />

pre-established security postures, a process that can greatly help prevent attacks, such as those from<br />

business email compromise or ransomware. Still, successful attacks happen and when they do, taking<br />

the proper steps to mitigate risk can help keep your premiums low.<br />

If a breach occurs and company data is being held <strong>for</strong> ransom, companies need to implement strict<br />

policies that restrict anyone at the organization from reaching out to the threat actor. We have seen many<br />

cases where someone on either the security or leadership team contacted the hacker and divulged<br />

in<strong>for</strong>mation that made the situation even harder to resolve. Examples include providing their names,<br />

company, whether they have a cyber insurance policy and the value of the data that was taken - giving<br />

more power to the hacker than intended. Keep in mind, hackers don’t always know who they have<br />

attacked and how valuable the data they found is. Instead, teams should contact an experienced recovery<br />

and remediation group, along with their cyber insurance company, to get assistance as quickly as<br />

possible. With this approach, experts can begin to rebuild company infrastructure even as negotiations<br />

play out. It might be counter-intuitive to get the bill running sooner, but at the end of the day, it is almost<br />

always the most cost-effective option. This act reduces the potential business interruption claim, gets a<br />

head start on recovery and identifies systems that could be re-built or upgraded vs. paid to unlock faster.<br />

Having your counsel work with regulators when breached has also become more essential than ever.<br />

Most recently, in September 2021, the U.S. Department of the Treasury’s Office of Foreign Assets Control<br />

(OFAC) produced an updated advisory on the use of digital currencies in ransomware attacks and other<br />

financial crimes, discouraging companies from simply paying the ransom to regain operational control<br />

after a successful ransomware attack. While these advisories are aimed at the payment of ransoms to<br />

sanctioned entities, it also may address the ballooning of ransom demands and spiking cyber insurance<br />

costs over the past year.<br />

In working with the client, their counsel, an IR firm and the insurer, the decision to pay a ransom is always<br />

determined on a case-by-case basis, and only after an expert analysis of the situation can be compiled<br />

and payment due diligence completed. While there are still times when a ransom is paid, more and more<br />

often, companies are alternatively using the resources provided by their insurer to remediate and rebuild.<br />

Even with much of the cyber insurance landscape still in flux, opting into cyber insurance can provide a<br />

sense of security if a victim of a cyber attack. It can help companies recover after a data breach when<br />

thousands or even millions of dollars are accrued from business disruption, revenue loss, legal fees,<br />

<strong>for</strong>ensic analysis and more. To best obtain cyber insurance, working directly with brokers and insurers<br />

that can provide advice <strong>for</strong> setting up security tooling and processes and protocols can be a huge boon<br />

<strong>for</strong> candidates. Even as coverage is secured, keeping premiums low can be addressed by maintaining<br />

and improving upon internal and external security practices, which can help mitigate risk further, making<br />

your systems protected from the majority of inevitable attacks. And, should a breach occur, calling your<br />

broker, insurance agent and associated firms at the first sign of a breach, such as remediation and<br />

recovery or those well-versed in OFAC regulations, will enable businesses to get back online faster, with<br />

more business value intact.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2022</strong> <strong>Edition</strong> 91<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!