entender el riesgo cibernético en el sector marítimo- portuario · 2019. 11. 7. · step 2. insur...

28
Entender el Riesgo Cibernético en el Sector Marítimo- Portuario Andrew Baskin 4 septiembre 2017 © 2017 HudsonAnalytix, Inc. 1

Upload: others

Post on 10-Aug-2021

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

Entender el Riesgo Cibernético en el Sector Marítimo-

Portuario

Andrew Baskin4 septiembre 2017

© 2017 HudsonAnalytix, Inc.1

Page 2: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

Agenda

I. Introducción

II. El qué, quién, dónde, cuándo, por qué y cómo de la ciberseguridad

III. Los factores de riesgo cibernético marítimos y portuarios

IV. ¿Cómo se maneja el riesgo cibernético?

2© 2017 HudsonAnalytix, Inc.

Page 3: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

I. INTRODUCCIÓN

3© 2017 HudsonAnalytix, Inc.

Page 4: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

4

¿En dónde tenemos representación?

© 2017 HudsonAnalytix, Inc.

Page 5: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

5

HACyberLogix

© 2017 HudsonAnalytix, Inc.

Page 6: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

Miembro asociado de la CIP-OEA

www.portalcip.org

Page 7: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

II. EL QUÉ, QUIÉN, DÓNDE, CUÁNDO, POR QUÉ Y CÓMO DE LA CIBERSEGURIDAD

7© 2017 HudsonAnalytix, Inc.

Page 8: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

8© 2017 HudsonAnalytix, Inc.

¿Qué es la ciberseguridad?

No solamente la informática

✅ Manejo de riesgo por toda la

organización

X

Page 9: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

9© 2017 HudsonAnalytix, Inc.

La confidencialidad, integridad y

disponibilidad de los datos

Amenazas Cibernéticas

Modificación de datos

almacenados

Transmisión de datos

falsos

Manipulación de flujos de

datos

Información falta en línea

posterior

Alteración de información

en línea

Page 10: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

Cyber Risk 10

El ataque contra Maersk

Page 11: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

1. Hackers

2. Hacktivistas

3. Servicios de

inteligencia extranjeros

4. Criminales organizados

5. Competidores

6. Infiltrados

7. Nosotros

© 2017 HudsonAnalytix, Inc.11

¿Quién nos está atacando?

Page 12: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

12© 2017 HudsonAnalytix, Inc.

Más sobre el “quién”

Page 13: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

13*Rod Beckstrom / Zurich - Atlantic Council Image, Risk Nexus, April 2014© 2017 HudsonAnalytix, Inc.

¿Dónde? Todo se conectan, más rápido

Page 14: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

Source: Mandiant M-Trends 2017 Report

14© 2017 HudsonAnalytix, Inc.

¿Cuándo? El reto de detectar un ataque

cibernético

Page 15: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

15© 2017 HudsonAnalytix, Inc.

¿Cómo suceden los ataques

cibernéticos?

Page 16: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

III. LOS FACTORES DE RIESGO CIBERNÉTICO MARÍTIMOS Y PORTUARIOS

16© 2017 HudsonAnalytix, Inc.

Page 17: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

Language

17© 2017 HudsonAnalytix, Inc.

Datos

Dinero

Idioma

Sistemas anticuados

¿Por qué la industria marítima-portuaria es

un blanco?

Page 18: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

Cyber Risk 18

El ataque contra el Puerto de Amberes

Page 19: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

19© 2017 HudsonAnalytix, Inc.

Qué es vulnerable?

(Casi)

¡Todo!

Page 20: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

1. Información personal

2. Propiedad intelectual

3. Información confidencial

4. Información operacional

5. Dinero

6. Política

7. Reputación empresarial

8. Competitividad empresarial

© 2017 HudsonAnalytix, Inc.20

¿Qué está en riesgo?

Page 21: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

21© 2017 HudsonAnalytix, Inc.

El hackeo contra IRISL: una interrupción

empresarial

Page 22: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

IV. ¿CÓMO SE MANEJA EL RIESGO CIBERNÉTICO?

22© 2017 HudsonAnalytix, Inc.

Page 23: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

23

1. ¿Cuáles son nuestras prioridades en la ciberseguridad?2. ¿ En qué invertirnos primero?3. ¿ Cuantos recursos financieros deberíamos reservar?4. ¿ Cómo sabemos lo que tenemos que comprar?5. ¿ Cómo podemos medir la efectividad de nuestras inversiones?6. ¿ Nuestras inversiones son sustentables?

© 2017 HudsonAnalytix, Inc.

Preguntas para los líderes marítimos y

portuarios

Page 24: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

24© 2017 HudsonAnalytix, Inc.

…qué significa?

La madurez de capacidades de

ciberseguridad

Page 25: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

Axio provides cyber risk engineering services and data an-

alytics to support the improved management of cyber risk,

including the deployment of cyber insurance. We work with

private and public sector organizations to help them better

understand and manage their exposure to cyber risk through

cybersecurity program evaluations and cyber loss scenario

development and analysis.

ABOUT US

Much of our work is performed for or in collaboration with the insurance industry; we are on the forefront

of developing and enabling improved cyber insurance products that protect firms in the energy sector and

other sectors for which physical damage, environmental damage, and bodily injury from cyber risk are

real concerns.

The core of our data analytics work is the Axio knowledge center, which aggregates data from our ser-

vices and other sources to provide a basis for cyber program capability benchmarks, modeling, and other

data sciences to improve the understanding of cyber risk losses and associated predictive indicators. Our

vision is that the rich data provided through our collaboration with the insurance industry will ultimately

provide insight into predictive indicators for cyber loss that materially advance cybersecurity knowledge.

AXIO PROCESS

Equiatem poreni ut ipienda et et ilic tem quid unt prae sapis samus simusci dessimus as suntot a turem.

Itatem sus. Equiatem poreni ut ipienda et et ilic tem quid unt prae sapis samus simusci dessimus as

suntota turem. Itatem sus.

CYBER INSURANCE AS A CONTROL

The Ultimate Value Proposition: Insight and analysis from Axio’s Cyber Risk Knowledge Center enables

clients to deploy risk transfer capacity to lower their overall risk.

SERVICES

Equiatem poreni ut ipienda et et ilic tem quid unt prae sapis samus simusci dessimus as suntot a turem.

Itatem sus. Equiatem poreni ut ipienda et et ilic.

ABOUT US CYBER INSURANCEAXIO PROCESS OUR SERVICESAXIO KNOWLEDGE

CENTER

MORE

INFORMATION

CONTACT US

“ Et ati as ut eum cus nisim vel in nossi ut rehendunt auditatusa voloriorum sam qui dolupta

verios ant eum qui doluptatio. Et volorrore necum quibus eosam fugitam.”

“ Et ati as ut eum cus nisim vel in nossi ut rehendunt auditatusa voloriorum sam qui dolupta

verios ant eum qui doluptatio. Et volorrore necum quibus eosam fugitam.”

“ Et ati as ut eum cus nisim vel in nossi ut rehendunt auditatusa voloriorum sam qui dolupta

verios ant eum qui doluptatio. Et volorrore necum quibus eosam fugitam.”

“ Et ati as ut eum cus nisim vel in nossi ut rehendunt auditatusa voloriorum sam qui dolupta

verios ant eum qui doluptatio. Et volorrore necum quibus eosam fugitam.”

1 2 3 4 5

Policy AnalysisIdentify gaps in

current insurance

coverage.

Understand the

types of impacts

from potential

cyber events that

are not covered by

your current

insurance.

Cyber Loss

ScenariosDevelop notional

and feasible cyber

loss scenarios.

Workshop to

brainstorm several

cyber loss

scenarios that

could lead to

covered and

uncovered impacts;

estimate total

potential cost of

each.

Program

EvaluationEvaluate cyber risk

management

capability and

maturity.

Evaluation based

on Cybersecurity

Capability Maturity

Model (C2M2).

Cyber Risk

EngineeringDetailed impact

analysis, frequency

estimation, and

loss control.

More in-depth

cyber loss scenario

development and

analysis than in

step 2.

Insurance

PlacementWith brokers and

insurers, secure

meaningful

coverage.

Various new

coverage forms

and enhanced

existing forms are

becoming available.

Catastrophic cyber risk

tranfer capacity lowers

the curve overall.

CYBERSECURITY CAPABILITY

RISK

INVEST IN

TECHNOLOGY

INVEST IN

TRANSFER

FOR INSURERS

Scalable cybersecurity program evaluations and benchmarking to

support underwriting, ranging from online self-evaluations to onsite

in-depth evaluations.

Data collection and analysis to monitor systemic and aggregation risk

and to improve cyber loss models.

Technology support for evaluations, data collection, and analysis.

Training and consulting services to better enable insurers and broker

partners to address the full range of cyber risk with clients.

FOR POLICYHOLDERS

Policy analysis to identify and understand cyber exclusions in

existing policies.

Scenario workshops to develop and analyze cyber loss scenarios.

Scalable cybersecurity program evaluations and benchmarking, ranging

from online self-evaluations to onsite in-depth evaluations.

Intra-organizational benchmarking to compare cyber risk management

capabilities among parallel business units for in-depth analysis of

large organizations.

Cyber risk engineering services to in-depth loss scenario analysis,

control, and modeling.

FOR BROKERS

Policy analysis to identify and understand cyber exclusions in existing

policies in support of specific clients or market analysis.

Consulting services for design and placement of bespoke cyber

insurance solutions such as captives to address unique client needs.

Training and consulting services to better enable brokerage teams to

address the full range of cyber risk with clients.

Axio Knowledge Center

Equiatem poreni ut ipienda et et ilic tem quid unt prae sapis samus simusci dessimus as suntot a turem.

Itatem sus. Equiatem poreni ut ipienda et et ilic.

Sign me up! Email Us

NEWSLETTER

Iquem turit iniquideo,

consum patus liquam

Iquem turit iniquideo,

CONTACT US

Address

address

Phone 000.000.0000

ABOUT US

NEWS

ENGAGE WITH US

LEGAL

Benchmarks

Cybersecurity

program

evaluations

Loss and claims

for insurance

partners

Pedictive Models

Aggregation

and systemic

risk analysis

Publications

Cyber risk and

insurance

training and

consulting

Loss scenario

development

and engineering

Aggregated data from

Risk Engineering services,

open sources, and

insurance industry

DATA SOURCES

KNOWLEDGE CENTER

INVEST IN CYBER CAPABILITIESSUSTAIN CAPABILITY & INVEST IN

INSURANCE

Courtesy: Axio© 2017 HudsonAnalytix, Inc.

25

El riesgo disminuye cuando las

capacidades se incrementan

Page 26: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

26© 2017 HudsonAnalytix, Inc.

Las regulaciones de ciberseguridad

marítima y portuarias

Page 27: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

27

1. Todos hemos sufrido un ataque

cibernético

2. No hay un solo remedio

3. Cada persona en una organización

está responsable para la

ciberseguridad

4. Evalúe sus capacidades actuales

5. Considere cual es su estado deseado

de la ciberseguridad

6. Determine donde su organización

debería invertir sus recursos

© 2017 HudsonAnalytix, Inc.

Unas conclusiones confortantes

Page 28: Entender el Riesgo Cibernético en el Sector Marítimo- Portuario · 2019. 11. 7. · step 2. Insur ance Placemen t W ith brok ers and insurers, secure meaningful co v erage. V arious

28© 2017 HudsonAnalytix, Inc.

Ferry Terminal BuildingSuite 3002 Aquarium DriveCamden, NJ 08103Oficina: +1.856.342.7500Cel: +1.703.581.8054

Email: [email protected]

Andrew BaskinVice PresidentePolítica y Comercio Global

Gracias…¿y preguntas?