J.S. Held Releases Insights on Risks & Opportunities Expected to Impact Organizations in 2025
Read MoreThe modern security ecosystem is diverse and ever-changing, a place where cyber risk is top of mind for leaders at all levels, and threats to information / data security and privacy evolve at the speed of the technical innovations driving progress. Within this dynamic ecosystem, we are increasingly connected across the globe, where organizations (and individuals) equally face the ever-present threat from cyberattack. No one is immune and the potential impact of a successful digital attack on your assets can affect operations, reputation, customer goodwill, and so much more.
Our data is increasingly under attack. Information is the life blood of our continuously evolving and increasingly connected global community. The power of data can be seen in all facets of the modern era, where the value of information has never been at a higher premium, giving rise to cutting-edge development and advancement. Unfortunately, as is often the case, the risk to the item of value increases at an equal or higher rate as that of the item’s expansion. Information has become one of the world’s most valuable intangible assets, while concurrently occupying the position of being one of the globe’s most vulnerable assets. Inherent risk is an expected outcome of this transformative process, ushering in great responsibility to protect the information that drives our advancement.
This article focuses on the professional expertise, processes, and technologies that are needed to mitigate the ever-increasing risk of cyberattacks and potential business interruptions on companies, organizations, and individuals.
The threat to information can be measured in many ways – from careless handling of data to the ongoing efforts of malicious actors to exploit, alter, or exfiltrate data. It is often the realized impact of this risk that ignites advancements in Cyber Security. This commodity we call information has transformed the way the world thinks and its place within the security function has become ever-present and ever important.
Considering this dynamic climate, addressing Cyber Security and business interruption impacts has never been more crucial for risk management and organizational success. Regardless of the size of your organization, a cyberattack can be extremely costly and detrimental to your business’s survival.
The heightened threat environment has made it imperative for organizations to maintain cyber insurance due to the growing sophistication of the threat actors. At the same time, cyber liability insurance coverage has become more expensive and harder to obtain. Premiums for these plans have been on the rise due to increased claims-related losses, rising demand for coverage, and large payout from ransomware attacks. Cyber insurance premiums increased by an average of 28% in the first quarter of 2022 compared with the fourth quarter of 2021. The evolution of the cyber insurance market has seen a shift from blanket policies with broad inclusions and high limits to policies with detailed coverage, clear technical and security requirements, and managed limits based on claim trends.
The complex insurance landscape can be seen as one of several factors converging to create an environment that may be well situated for turbulent weather. Possible elements that could be included in the coming storm, are:
Increased focus from regulators and legislators on not only methods of prevention and response, but also the willingness of organizations to adequately invest in Cyber Security in advance of an attack, as seen in the recent Cyber Security recommendations from the U.S. Securities and Exchange Commission (SEC).
While this current situation appears dire, never before have the tools and resources been available in the volume, comprehension, and variety to meet the challenge and reduce the risk.
As the threat from cyberattacks has evolved, so have those who would challenge the apparent invincibility of the threat actors. They often seem to be one step ahead and better prepared. However, if we utilize the resources at our disposal in advance of the potential attack, we can effectively prepare and respond to minimize the impact of this perceivably unbeatable foe – the “Cyber Threat Actor.”
To meet the growing challenge, Cyber Security professionals must leverage the people, processes, and technology at their disposal, to protect the confidentiality, integrity, and availability of the data / information they are responsible for; thus, ensuring security and privacy.
There are some foundational concepts that are critical to success.
Aggregating these components into an effective Cyber Security program requires a proactive leader with vision who embraces collaboration. As noted, Cyber Security is a team sport that demands knowledge of industry best practices, the ability to establish the best compilation of services and capabilities for the organization to deliver the expected risk management posture, and the determination to follow through with the effort to full implementation.
The right information security / privacy leader is expected to empower, protect, and enable the enterprise, operations, and marketability, through delivery of the best available security operations program. If required as part of the enterprise, this leader will drive compliance including regulatory, legal, and governance programs, while inspiring a culture of security and initiative.
Resources necessary to fulfill this mission are not always available within the organization. Partnering with a service provider who can respond when needed to enhance capabilities is vital to the best of Cyber Security leaders. Some of the best service providers deliver tailored services to fill in the gaps where necessary. Organizations should look for providers that offer services that are individually customized for each client in their effort to establish or enhance their Cyber Security program. In the end, the best providers should supply a team of experts that bring decades of experience to each engagement, specializing in incident response and recovery, proactive resiliency building, pre-event financial planning, and financial loss analysis.
We would like to thank Jessica Eldridge, Robert McSorley, and Ron J. Yearwood, Jr., CISSP, CISM, CIPM, for providing insight and expertise that greatly assisted this research.
Jessica Eldridge is a Vice President in J.S. Held's Forensic Accounting -- Insurance Services practice. She has over 19 years of investigative and forensic accounting experience in measuring financial damages involving business interruption, cyber, extra expense, stock, builder’s risk, employee dishonesty / fidelity, personal injury, subrogation, and litigation support services. Jessica also has extensive experience with the administration of common fee funds and the oversite of property damage claims for large construction projects.
Jessica can be reached at [email protected] or +1 401-301-8565.
Robert McSorley is a Managing Director in J.S. Held's Intellectual Property practice. Based in the Chicago office of Ocean Tomo, a part of J.S. Held, Robert has 30 years of experience addressing the economic, financial, and accounting issues concerning commercial litigation. Robert has focused on intellectual property disputes since 1998, and regularly evaluates the measures and amounts of monetary recovery for infringement / misappropriation. He has offered expert testimony in federal courts and in depositions on dozens of occasions, and courts and juries have adopted his opinions and conclusions. A certified public accountant and a licensed attorney, Robert is a member of the Licensing Executive Society, the American Institute of Certified Public Accountants, and the Federal Circuit Bar Association.
Robert can be reached at [email protected] or +1 312 327 4412.
[1] Executive Trim Construction, Inc. v. Gross, 525 F.Supp.3d 357 (N.D.N.Y, 2021).
This paper examines the inherent risks surrounding the protection of client electronic data on cloud-based platforms that have arisen with the proliferation of the at-home work setting. It also explains why it’s important for users...
As businesses continue to rely on computers and digital storage of important data, cyberattacks are a growing potential threat to these organizations—especially now, as businesses have transitioned their workforces to work remotely. There are many...
This paper discusses the application of digital forensics, the types of data digital forensics experts work with, the investigation process, and some example scenarios wherein digital forensics experts are called to help address impacts of...