Cyber Risks

Data Protection and the Cloud - Meeting Growing Security Needs
The risk of data breaches, either accidental or through malicious hacking, is an unfortunate consequence of electronic…
Summary
Cyberassurance : Offres et solutions
(Contribution from a SCOR expert to an external publication) Le monde est entré dans l’ère numérique. L’information…
Summary
Cyber resilience - The cyber risk challenge and the role of insurance
(Contribution of a SCOR expert in an external publication) The digital revolution is affecting nearly all aspects…
Cyber risk has become a topic of great importance in today’s risk management and insurance is seen…
Summary
Cyber risks are high on the business agenda of every company, but they are difficult to assess…
Summary
This paper proposes a methodology for a common cyber risk categorisation. The paper’s goal is to promote…
Summary
Concern over cybersecurity is growing across all sectors of the global economy, as cyber risks have grown…
We analyze the question of risk bearing in the emerging market of the Internet of Things. While…
Summary
This white paper examines the current state of the cyber threat worldwide and the insurance industry’s efforts…
Summary
This paper discusses the adequacy of insurance for managing cyber risk. To this end, we extract 994…
Summary
The cyber threat landscape is evolving with new aspects of the threat emerging all the time. This…
As a result of the rise of cyber incidents and the increased focus on computer security, more…
Summary
To help show our support of Data Privacy Day 2013 and the importance of “Data Privacy and…
Summary
The enormous expansion in the availability of information presents opportunities and challenges for business and government. Keeping…
Summary
this research into the scope and availability of cyber insurance was undertaken by Airmic in order to…
Summary
Internet users such as individuals and organizations are subject to different types of epidemic risks such as…
Summary
As cyber liability risk continues to widen, a broader array of businesses are finding they need to…
Summary
Recent works on Internet risk management have proposed the idea of cyber-insurance to eliminate risks due to…
Summary
Internet users such as individuals and organizations are subject to different types of epidemic risks such as…
Summary
Cyber-insurance is often suggested as a tool to manage IT security residual risks but the accuracy of…
Summary
Business is currently on the front lines of a raging cyber war that is costing trillions of…
Summary
We propose a comprehensive formal framework to classify all market models of cyber-insurance we are aware of.…
Summary
First, cyberinsurance results in higher security investment, increasing the level of safety for information technology (IT) infrastructure.…
Summary
This paper investigates how network security and user welfare will be affected by the presence of competitive…
Summary
La notion de l'assurabilité est immédiatement évoquée dès qu'il s'agit de risques nouveaux ou atypiques. Les cyber-risques…
Summary
Cyberinsurance to cover losses and liabilities from network or information security breaches can provide incentives for security…
Summary
Cyber-insurance is considered as appropriate means to absorb financial losses caused by computer security breaches. Since insurance…
Summary
The economic consequences of breaches in information security cannot be underestimated. According to the World Bank 2002…
Summary

Cybersecurity

Understanding Systemic Cyber Risk

P&C > Cyber Risks
10/2016
Cyberdependency and the dramatic technological transformations that are happening to enterprises, infrastructures and systems globally are profoundly…
Summary
This cyber security risk assessment (CSRA) in intended to provide insight into the underlying causes, consequences and…
Summary
This paper studies investment in cybersecurity, where both the software vendor and the consumers can invest in…
Summary
The main predictions of the model are that effective botnets are located in countries with many internet…
Summary
Cyber attacks against the financial system are becoming more frequent, more sophisticated and more widespread. Given the…
Summary
As per the new strategic focus of ECA on evidence-based policy and analytical research, this policy brief…
Summary

Cyber risks: the growing threat

P&C > Cyber Risks
06/2014
The cyber risk landscape is evolving rapidly in a multitude of areas. Governments are facing an unprecedented…
Summary
Cybercrime is a growth industry. The returns are great, and the risks are low. We estimate that…
Summary

Mythes et Légendes des TIC

P&C > Cyber Risks
04/2014
Ce livre collectif de forum ATENA propose une approche originale pour expliquer différentes facettes des Technologies de…
The internet and associated information technology (IT), which often go by the name ‘cyberspace,’ give modern societies,…
Summary

Get Cybersafe - Protect while you connect

P&C > Cyber Risks
09/2013
Get Cyber Safe Guide for Small and Medium Businesses.   Gouvernment of Canada, 2013
Summary
The last few years have seen the threat of a crippling cyber-attack against the U.S. electric grid…
Summary
Governments, businesses and private citizens across the globe are only beginning to understand the profound implications of…
Summary

Guide d’hygiène informatique (ANSSI)

P&C > Cyber Risks
10/2012
Protéger les données et le réseau informatique des entreprises est aujourd’hui crucial pour leur survie et leur…
Summary
La cybersécurité des systèmes industriels. Alors qu’elle faisait, il y a encore peu, figure de science réservée…
Summary

Cybercrime strategies

P&C > Cyber Risks
03/2012
The security of information and communication technology (ICT) as well as the question of cybercrime have been…
Summary

Cyber Dissuasion

P&C > Cyber Risks
02/2012
Dans un monde où près du tiers des habitants ont accès à internet et dans lequel la…
Summary

SANS Mobility / BYOD Security Survey

P&C > Cyber Risks
02/2012
Mobile devices and their apps have become foundational tools for today’s workforce, and they are more complex…
Summary
This report is an overview of cyber crime in Britain with exposure of this population and new…
Summary

Second Annual Cost of Cyber Crime Study

P&C > Cyber Risks
07/2011
Benchmark Study of U.S. Companies   Sponsored by ArcSight, an HP Company - Independently conducted by Ponemon…
Summary
Virtualization separates applications, desktops, machines, networks, data and services from their physical constraints. Virtualization is an evolving…
Summary

Basic Concepts in Cyber Warfare

P&C > Cyber Risks
04/2011
Developments in computers have made possible far reaching changes in all areas of life, and the rapid…
Summary

Reducing Systemic Cybersecurity Risk

P&C > Cyber Risks
01/2011
This report is part of a broader OECD study into ―Future Global Shocks‖, examples of which could…
Summary
Cybercrime and its potential ramifications exemplify ‘one of those things that nobody wants’ (Popper 1963). From today's…
Summary
Enquête sur les menaces, la gestion des risques et les formes de coopération.   Center for Security…
Summary
This cyber security risk assessment (CSRA) in intended to provide insight into the underlying causes, consequences and…
Summary

Infrastructure

This is an analysis by a joint team to provide a lessons learned community resource from the…
Summary

Contagion Risk and Network Design

P&C > Cyber Risks
04/2015
Individuals derive benefits from their connections, but these may, at the same time, transmit external threats. Individuals…
Summary
In recent decades, critical infrastructure has become dependent on complex software applications to perform vital societal functions…
Summary
The CSA guidance as it enters its third edition seeks to establish a stable, secure baseline for…
Summary
A functioning modern society depends on a complex tapestry of infrastructures: energy, communications, transportation, food, and many…
Summary
A year ago, the McAfee report, “In the Crossfire: Critical Infrastructure in the Age of Cyberwar,” showed…
Summary

Cloud Computing Security Risk Assessment

P&C > Cyber Risks
11/2009
ENISA, supported by a group of subject matter expert comprising representatives from Industries, Academia and Governmental Organizations,…
Summary
Data mining is an increasingly important technology for extracting useful knowledge hidden in large collections of data.…
Summary
International data privacy legislation and increasing consumer demands for the protection of their personal information mean it…
Summary
2012. Perhaps more so than any other year, the large scale and diverse nature of data breaches…
Summary
The Data Protection Act 1998 (the DPA) is based around eight principles of ‘good information handling’. These…
Summary
Guide pratique à l'attention des directions générales et des directions opérationnelles.   Pascal Antonini, Sophie Bouteiller, Matthieu…
Summary
Our world is changing. It is complex, hyperconnected, and increasingly driven by insights derived from big data.…
Summary
Global Information Security Survey. Insights on IT risk. Business Briefing.   Ernst & Young, November 2012
Summary
This Guide explains the purpose and effect of each principle, and gives practical examples to illustrate how…
Summary
Composé d'une méthode et d'un catalogue de mesures, ce guide a été conçu pour aider les organismes…
Summary
Composé d'une méthode et d'un catalogue de mesures, ce guide a été conçu pour aider les organismes…
Summary
Information is the lifeblood of most organisations, and we are all managing more of it than ever…
Summary
2011 will almost certainly go down as a year of civil and cultural uprising. Citizens revolted, challenged,…
Summary
The case for growing accountability. Insights on IT risk. Business briefing.   Ernst & Young, January 2012
Summary
Study: United States, our seventh annual benchmark study concerning the cost of data breach incidents for U.S.-…
Summary
Much of the world’s intellectual property (IP) is embodied in music, movies, videos, books, articles, illustrations and…
Summary
Intellectual Property (IP) crime remains a tangible threat within the UK and internationally. The IP Crime Report…
Summary
La présente étude répond à un triple objectif : définir l’étendue du phénomène de la contrefaçon sur…
Summary
This Advisory describes a form of phishing attack that targets domain name registrants. The attacker impersonates a…
Summary
Actes de la Conférence-débat à l’initiative de l’AFNIC - Association Française pour le Nommage Internet en Coopération…
Summary
Publications and guides on cybersecurity - Government of Canada
Summary
Over 1,981 original computer security white papers in 77 different categories.
Summary
Toutes les publications sur les risques numériques réalisées par le CIGREF
Summary
All recommendations and guides by ANSSI (Agence Nationale de la Sécurité des Systèmes d'Information - National Security…
Summary
Regular updates on Cyber Risks and Information Security by Clusif (Club de la Sécurité de l'Information Français)
Summary
"The OECD Directorate for Science, Technology and Industry (STI) undertakes a wide range of activities to better…
Summary
The UK’s independent authority set up to uphold information rights in the public interest, promoting openness by…
Summary
Federal Act on Data Protection (DPA) of 19 June 1992 (Status as of 1 January 2011) The…
Summary
The Personal Data Protection Commission (PDPC) is a Singapore Government statutory body established on 2 January 2013 to…
Summary
The European Data Protection Supervisor is an independent supervisory authority devoted to protecting personal data and privacy…
Summary
All Mandiant® M-Trends reports and resources on Cyber Threats and Security.
Summary
Bundesministerium für Wirtschaft und Technologie
Summary
Downloadable Master thesis (full text) / Mémoires téléchargeables en texte intégral.   Centre d'Etudes Internationales de la…
Summary

Top of page