Apac
  • Home
  • CXO Insights
  • CIO Views
  • News
  • Conferences
  • Newsletter
  • Whitepapers
  • About us
Apac
  • Admired Tech

    Agile

    AI Healthcare

    Artificial Intelligence

    Augmented Reality

    Aviation

    Big Data

    Blockchain

    Cloud

    Cryptocurrency

    Cyber Security

    Digital Transformation

    Drone

    HPC

    Infrared

    Internet of Things

    Networking

    PropTech

    Remote Work

    Scheduling Software

    Simulation

    Startup

    Storage

    Wireless

  • Banking

    E-Commerce

    Education

    FinTech

    Food and Beverages

    Healthcare

    Insurance

    Legal

    Manufacturing

    Pharma and Life Science

    Retail

    Travel and Hospitality

  • CISCO

    Microsoft

    Oracle

    Salesforce

    SAP

    ServiceNow

  • Business Intelligence

    CEM

    Cloud-based Planning

    Cognitive

    Compliance

    Contact Center

    Contact Tracing

    Contactless Payments

    Content Management System

    Corporate Finance

    CRM

    Custom Software Development

    Data Center

    Enterprise Architecture

    Enterprise Communications

    Enterprise Contract Management

    ERP

    Field Service

    HR Technology

    IT Service Management

    Managed Services

    Procurement

    Product Management

    RegTech

    Revenue Management

Menu
    • Risk Management
    • Cognitive
    • Digital Transformation
    • E-Commerce
    • Blockchain
    • RegTech
    • IT Service Management
    • Augmented Reality
    • Microsoft
    • Contact Center
    • Collaboration
    • Healthcare
    • MORE
    #

    Apac CIO Outlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIO Outlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Risk Management
    Editor's Pick (1 - 4 of 8)
    left
    Risk Assessment Keeping Cyber Bully Away

    Paul Ernst, CIO, Sandler Capital Management

    Digitization Transforming Business in all Sectors

    Robert Aitken, CIO, Beyond Bank Australia

    Trend Micro: Nurturing Risk Management with Hybrid Cloud

    CEO & Co-founder

    Ensuring your Seat on the Leadership Table

    David Otte, CAO and CIO, Bingham Greenebaum Doll LLP

    Cyber Fraud - the Silent Killer

    Bill Murphy, SVP, CIO & CRO, Fidelity Bank of Florida N.A.

    All Roads Lead to Risk Assessment

    Christopher R. Barber, EVP & CIO, Commonwealth Business Bank

    Fintech: Opportunities and Challenges in APAC

    Huankiat Seh, Co-founder and CTO, CoAssets Limited

    Big Data Analytics - Finding Diamonds in the Rough

    Fulvio Barbuio, Head Corporate Treasury and Risk, Australian Broadcasting Corporation

    right

    Cyber Enterprise Risk Management-What are Key Factors to Success?

    By Kieran Stack, MD & ERM Practice Leader and Stephanie Snyder, National Cyber Sales Leader, Aon Risk Solutions

    Tweet
    content-image

    Kieran Stack, MD & ERM Practice Leader and Stephanie Snyder, National Cyber Sales Leader, Aon Risk Solutions

    “How well is my organization’s

    “How does adopting a holistic approach to cyber risk management help my organization better manage volatility risk associated with my cyber risk exposure?”

    “The strive for efficiency in organizations’ data management platforms can potentially be at odds with the desire to increase cyber risk management controls”

    Boards of Directors, senior management and risk leaders are being increasingly asked to respond to questions like those posed above. In today’s Internet of Things environment, cyber risk continues to grow and is becoming increasingly more complex.  The interconnected nature of cyber risk has been felt by many organizations as a multitude of data breaches in the past several years has in some cases resulted in an interruption to their business operations and eroded consumer trust in those organizations.

    Historically, we have seen cyber risk limited to the liability and expenses related to a breach of private information, such as personal information, healthcare information or credit card information.  Many view 2014 as the year of the retail breach and 2015 as the year of the healthcare breach.

    Given the evolving nature of technology, we have started to see network security breaches result in business interruption losses. When organizations suffer a network outage, there can be significant expenses related to computer forensics, remediation, changes of systems architecture, hardware replacement costs and additional costs to keep the organization operating, as well as the loss of net income. Many of these attacks have also resulted in losses to intangible (data) assets, in which hard drives have been wiped clean of data or employees have been unable to access servers.

    Cyber breaches have proved that there can be significant implications to an organization’s balance sheet and a potential impact on the Board of Directors. In fulfilling their fiduciary responsibility, Boards of Directors are recognizing that cyber breaches are a critical risk that can impact their organization’s ability to meet its strategic objectives and in response are reinforcing the application of advanced risk management practices to mitigate the potential impact to organizational performance during significant cyber risk events.

    For several years Aon, in close collaboration with the Wharton School of the University of Pennsylvania have been researching the importance of advanced risk management practices with the proper tools and techniques to empower results. The observations and finding of this research resonate closely with the application of advanced risk management practices to managing an organization’s cyber risk.  The Aon Risk Maturity Index Insight Report has consistently observed direct correlations between enhanced risk management practices and improved performance in the financial markets. Working with annual financial results from over 300 publicly traded companies around the world; researchers found a correlation between higher levels of risk maturity and improved market performance, profitability, and organizational resiliency. Examined through the lens of cyber risk, these findings continue to emphasize the importance of a robust, integrated, and holistic risk management program.

    By nature, organizations are incredibly complex; many operate with multiple subsidiaries around the world, across numerous business functions, with thousands of colleagues and processes. From a cyber risk standpoint such organizations have multiple risk owners spread across corporate functions and operating divisions. Cyber risk management also extends beyond the physical walls of an organization.  Increased corporate data aggregation will continue to drive engagement with cloud providers as organizations are forced to find more efficient ways to manage their data assets. The strive for efficiency in organizations’ data management platforms can potentially be at odds with the desire to increase cyber risk management controls. Some may argue that replacing data centers with cloud providers reduces the overall network security risk while others remain concerned about vendor engagements and the additional potential for breaches via an outsourced network.

    With such complexities, it becomes difficult for an organization to understand and respond to its integrated cyber risk profile. Cyber risk is constantly evolving within organizations, whether across the entire organization or at the individual business function level.  Responding to the constantly evolving nature of cyber risk in a siloed manner can therefore potentially have significant consequences.

    Recognizing that there is no ‘one size fits all’ solution to cyber risk, it is important to take a holistic view at the cyber risk that flows through an organization and build a cross-functional understanding of that risk.  Consideration should be given to the various stakeholders in senior management, information technology, legal, human resources and risk management. Aon and Wharton researchers have found three key factors that distinguish high and low risk management practices within organizations;

    1.Communication of risk management strategies, objectives, and practices 2.Collaboration in executing risk based practices across risk-based functions 3.Consensus on strategy for cross-functional risks

    Let’s consider this theme further.  What approaches can organizations take to differentiate their risk management practices and apply those practices to the management of cyber risk?

    •Awareness of the complexity of cyber risk •Agreement on strategy and action •Alignment to execute

    Increasing performance along these dimensions requires a robust process that focuses on:

    •the identification of strengths and weaknesses •strong communication of cyber risk and its management across functions and at all levels of the organization •buildingconsensus regarding the steps to be taken Effective cyber risk management is the result of having the appropriate people, tools and processes in place. It consists of having a clear understanding of an organization’s key cyber risk vulnerabilities, knowing who is responsible for managing those vulnerabilities, having an effective communication process in place and integrating key cyber risk concepts into strategic decision making. If history has taught us nothing else, it is that even robust network security may contain vulnerabilities and that when thinking about a network security breach, it is advised not to consider ‘if’, but rather ‘when’.

    Check out: Top Fraud And Breach Protection Companies
    tag

    Data Management

    Financial

    Information Technology

    Breach Protection

    Weekly Brief

    loading
    10 Most Promising Risk Management Solution Providers - 2017

    Featured Vendors

    Delta Insurance

    Ian Pollard, Co-Founder & MD

    Broadridge

    David Becker , MD, Asia Pacific

    ON THE DECK

    Other 2021

    Top Vendors

    Content Management System 2020

    Top Vendors

    Previous Next

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Transforming business performance by taking an outside-looking-in customer perspective

    Transforming business performance by taking an outside-looking-in customer perspective

    Graham Perry, Managing Director, BWH Hotel Group Australasia
    Winning the Customer Service Rush During the Holiday Returns Season

    Winning the Customer Service Rush During the Holiday Returns Season

    Mark Abramowitz, SVP Marketing, Service Cloud at Salesforce
    MOBILE APPS IN THE NEW DECADE

    MOBILE APPS IN THE NEW DECADE

    Bibaswan Banerjee, Director, CRM and User Analytics, Klook
    Covid-19 and Lessons from the largest Work from Home Experiment

    Covid-19 and Lessons from the largest Work from Home Experiment

    Vikas Verma, Director Human Resources, United Overseas Bank
    Reimagine the Future of Education in a post-COVID-19 World

    Reimagine the Future of Education in a post-COVID-19 World

    Samson Tan, Head, Centre for Innovation in Learning, National Institute of Education
    A creative approach to remote simulator installations

    A creative approach to remote simulator installations

    Sharon Cooke, CEO, Airways International Ltd
    Priority 2021: Achieving 100% Automation in Finance

    Priority 2021: Achieving 100% Automation in Finance

    Ekaterina Sejourne, CFO, Puma Energy Asia Pacific Pierre Costa, Global CIO, Puma Energy
    Tech Tonic: How technology is helping the travel sector recover from the impact of Covid-19

    Tech Tonic: How technology is helping the travel sector recover from the impact of Covid-19

    Patrice Simon, CTO Data and Analytics, CWT
    Loading...

    Copyright © 2021 APAC CIOoutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy  |  Sitemap |  Subscribe

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://risk-management.apacciooutlook.com/cxoinsights/cyber-enterprise-risk-managementwhat-are-key-factors-to-success-nwid-2007.html