Deloitte Insights and our research centers deliver proprietary research designed to help organizations turn their aspirations into action.

DELOITTE INSIGHTS

  • Home
  • Spotlight
    • Weekly Global Economic Outlook
    • Top 10 Reading Guide
    • Future of Sports
    • Technology Management
    • Growth & Competitive Advantage
  • Topics
    • Economics
    • Environmental, Social, & Governance
    • Operations
    • Strategy
    • Technology
    • Workforce
    • Industries
  • More
    • About
    • Deloitte Insights Magazine
    • Press Room Podcasts

DELOITTE RESEARCH CENTERS

  • Cross-Industry
    • Home
    • Workforce Trends
    • Enterprise Growth & Innovation
    • Technology & Transformation
    • Environmental & Social Issues
  • Economics
    • Home
    • Consumer Spending
    • Housing
    • Business Investment
    • Globalization & International Trade
    • Fiscal & Monetary Policy
    • Sustainability, Equity & Climate
    • Labor Markets
    • Prices & Inflation
  • Consumer
    • Home
    • Automotive
    • Consumer Products
    • Food
    • Retail, Wholesale & Distribution
    • Hospitality
    • Airlines & Transportation
  • Energy & Industrials
    • Home
    • Aerospace & Defense
    • Chemicals & Specialty Materials
    • Engineering & Construction
    • Mining & Metals
    • Oil & Gas
    • Power & Utilities
    • Renewable Energy
  • Financial Services
    • Home
    • Banking & Capital Markets
    • Commercial Real Estate
    • Insurance
    • Investment Management
    • Cross Financial Services
  • Government & Public Services
    • Home
    • Defense, Security & Justice
    • Government Health
    • State & Local Government
    • Whole of Government
    • Transportation & Infrastructure
    • Human Services
    • Higher Education
  • Life Sciences & Health Care
    • Home
    • Hospitals, Health Systems & Providers​
    • Pharmaceutical Manufacturers​
    • Health Plans & Payers​
    • Medtech & Health Tech Organizations
  • Tech, Media & Telecom
    • Home
    • Technology
    • Media & Entertainment
    • Telecommunications
    • Semiconductor
    • Sports
Deloitte.com
Deloitte Insights logo
  • SPOTLIGHT
    • Weekly Global Economic Outlook
    • Top 10 Reading Guide
    • Future of Sports
    • Technology Management
    • Growth & Competitive Advantage
  • TOPICS
    • Economics
    • Environmental, Social, & Governance
    • Operations
    • Strategy
    • Technology
    • Workforce
    • Industries
  • MORE
    • About
    • Deloitte Insights Magazine
    • Press Room Podcasts
    • Research Centers
  • Welcome!

    For personalized content and settings, go to your My Deloitte Dashboard

    Latest Insights

    Creating opportunity at the intersection of climate disruption and regulatory change

    Article
     • 
    7-min read

    Better questions about generative AI

    Article
     • 
    2-min read

    Recommendations

    Tech Trends 2025

    Article

    TMT Predictions 2025

    Article

    About Deloitte Insights

    About Deloitte Insights

    Deloitte Insights Magazine, issue 33

    Magazine

    Topics for you

    • Business Strategy & Growth
    • Leadership
    • Operations
    • Marketing & Sales
    • Diversity, Equity, & Inclusion
    • Emerging Technologies
    • Economy

    Watch & Listen

    Dbriefs

    Stay informed on the issues impacting your business with Deloitte's live webcast series. Gain valuable insights and practical knowledge from our specialists while earning CPE credits.

    Deloitte Insights Podcasts

    Join host Tanya Ott as she interviews influential voices discussing the business trends and challenges that matter most to your business today. 

    Subscribe

    Deloitte Insights Newsletters

    Looking to stay on top of the latest news and trends? With MyDeloitte you'll never miss out on the information you need to lead. Simply link your email or social profile and select the newsletters and alerts that matter most to you.

Welcome back

To join via SSO please click on the key button below
Still not a member? Join My Deloitte

Quantifying risk: What can cyber risk management learn from the financial services industry?

by Ash Raghavan, Adam Thomas
  • Save for later
  • Download
  • Share
    • Share on Facebook
    • Share on Twitter
    • Share on Linkedin
    • Share by email
25 July 2016

Quantifying risk: What can cyber risk management learn from the financial services industry? Deloitte Review issue 19

26 July 2016
  • Ash Raghavan Global
  • Adam Thomas United States
  • Save for later
  • Download
  • Share
    • Share on Facebook
    • Share on Twitter
    • Share on Linkedin
    • Share by email

Quantitative models to measure cyber risk—the same kinds of models widely used by financial services firms—are starting to gain broader acceptance. But risk managers may be led astray if they rely too much on models out of context. What lessons in effectively using models does the financial services industry hold for cyber risk management?

ER_3323_interior-imageThe financial services industry is known for its sophisticated approaches to managing the risk associated with the financial instruments it sells. It’s an industry imperative: No informed customer would invest with a financial services firm that lacked provisions for guarding against extensive losses. Among these approaches, one of the most widespread is the use of “fantastically complex mathematical models for measuring the risk in their various portfolios.”1 These models even allow firms to assign a dollar value to that risk—effectively allowing portfolio managers to quantify the risk their investments generate.

Today, many organizations are entering a new risk domain—cyber risk management—that exhibits many of the same characteristics as financial risk management in the financial services industry. While the comparison between the two may seem far-fetched at first, there are, in fact, a number of parallels that suggest that experiences in one domain can hold valuable lessons for the other. These parallels include:

Learn More

View the Dbriefs webcast

Explore the Cyber Risk Management collection

Read Deloitte Review

  • Complexity. For years, the financial services industry has used complex financial instruments where risks arise from the interaction of many disparate factors. In the cybersecurity context today, businesses are incurring increasing risks through their use of complicated computer system architectures and adoption of cloud computing, bring-your-own-device IT models, mobility, and other digital advancements. Just as with highly complex financial instruments, the intricacies of the interactions among risk factors can make it difficult to identify and assess relevant risks. While risk models and other quantitative metrics and qualitative sources can provide warning signs, business leaders in both the modern financial services and cyber risk eras face the distinct possibility that these warning signs may not always be clearly understood.
  • The use of models for risk management. Financial institutions use a variety of risk models, some long established and others relatively new. Some risk management leaders today who attempt to apply quantitative models to measure cyber risk rely on some of those same types of models. The danger here is that senior executives and boards may overlook the complexity and, in some cases, limits of these models. The simplicity of many of these models’ outputs—often a single, easy-to-fathom number—can mask the intricacy of the models’ inputs and analysis process, potentially prompting executives to assume their quality and completeness rather than carefully scrutinizing the models’ validity under particular circumstances.
  • Potential systemic failures. In the financial services industry, there is constant recognition that financial institution failure can have ripple effects across borders, entire segments of the financial services industry, and, ultimately, much of the rest of the economy. Today’s cyber risks potentially threaten entire ecosystems, including business, government, and societal.

Of course, public officials and leaders in many private sector industries are highly aware of cyber risks. Cybersecurity spending worldwide continues to grow, and is predicted to reach $170 billion by 2020, up from $75.4 billion in 2015.2 Yet many struggle to determine the scope of those risks and how to appropriately balance risk-reward trade-offs.

It is this drive to quantify cyber risk and calculate the return on investment in cybersecurity that is fueling efforts to put a number to the extent of a company’s cyber risk—paralleling the importance financial services firms place on quantifying financial risk. Investment, banking, and insurance executives understand that they take sometimes significant risks, and they want a number gleaned from risk models to quantify that risk and guide their decisions. However, in certain instances, the tantalizingly close potential for large rewards can lead executives to ignore the results of those models—or at least take them for granted by not fully grasping what the number really indicates.3

Similarly, business leaders today are confronted with the large demand for new technologies and the potentially huge returns from investing in these technologies. These leaders also understand, though, that by continuing to extend complex information systems and networks, they are often significantly increasing risk to the enterprise. This is leading to growing interest in developing risk models that quantify cyber risk and support the development and execution of cyber risk strategies and security programs.

What types of models are being used, and in what context? By relying too heavily on these models and ignoring other cyber risk indicators, could business leaders face a danger of being blindsided by a catastrophic cyber event?

Certainly, risk models are important tools for framing and understanding risk elements. But as they work to quantify cyber risk, enterprise leaders and chief information security officers can benefit from understanding financial institutions’ risk management experience. Organizations should be cautious of relying solely on risk models and, instead, build strong governance processes surrounding these models. Without strong processes, leaders could become overconfident of their cyber risk posture—and oblivious to warning signs—leading to potential financial, operational, and reputational loss.

The risk of a black swan event

Various types of risk can influence the value and performance of financial investments, generally categorized as credit, liquidity, market, and operational risk. Value at risk, or VaR, is prominent among the modeling techniques financial institutions have used for decades to calculate the market risk within their investment portfolios. VaR is “a statistical technique [for] measur[ing] and quantify[ing] the level of financial risk within a firm or investment portfolio over a specific time frame.”4

In its most common form, VaR measures portfolio risks over short periods of time, assuming “normal” market conditions. An investment manager whose portfolio shows a VaR of $100 million one week, for example, has a 99 percent chance of not losing more than that amount from the portfolio the following week.5 However, VaR typically cannot describe the 1 percent of the time that $100 million will be the least that can be lost. This limitation means that VaR cannot measure the risk of a “black swan event”—a highly improbable occurrence with outsized impact—such as cascading home foreclosures and subprime mortgage losses.6

Key takeaway: Risk models like VaR serve a vital function, aggregating a variety of inputs and providing an indicator for decision makers to factor into their reasoning. An inherent shortcoming, however, is that the output is only as good as the input, and neither necessarily quantifies all risks.

Growing cyber concerns and the drive to quantify cyber risk

Here, it’s important to understand public and private sector concerns about cyber black swan events and the emerging role of a “cyber VaR” model in quantifying cyber risk.

Officials across the globe are increasingly concerned about the risks that cyberthreats pose worldwide, some warning of the potential for cyber events to grow into systemic calamities. Greg Medcraft, former chairman of the board of the International Organization of Securities Commissions, for example, has predicted that “the next big financial shock—or ‘black swan event’—will come from cyberspace, following a succession of attacks on financial players.”7

Corporate risk managers also worry about a cyber black swan event. In a 2015 study by the Depository Trust & Clearing Corporation (DTCC), 61 percent of financial services risk managers surveyed believed the probability of a high-impact event in the global financial system had increased in the previous six months. As in the previous DTCC survey conducted in Q1 2015, cyber risk remained the No. 1 concern globally, with 70 percent of all respondents citing it as a top-five risk (figure 1). Respondents cited the frequency of attacks and the ability to manage them as top concerns.8

ER_3323_Figure-1

Certainly, cyberthreats are not exclusive to financial services and the global financial system. The potential for cyber black swan events in other sectors is a stark reality:

  • Utilities industry. A December 2015 cyberattack that shut down part of Ukraine’s power grid prompted the Obama administration to issue a warning to US power companies, water suppliers, and transportation networks about the risk of similar attacks.9
  • Health care. After persistent 2015 and 2016 cyberattacks on health care facilities and hospitals in North America, the US Department of Homeland Security, collaborating with the Canadian Cyber Incident Response Centre, issued a warning to health care organizations about ransomware and other variants that can cause “temporary or permanent loss of sensitive or proprietary information, disruption to regular operations, financial losses,” and reputational harm.10
  • Oil and gas. Three out of four oil and gas, energy, and utility IT professionals surveyed in late 2015 had experienced an increase in successful cyberattacks, and most of those (68 percent) said the rate of successful cyberattacks had increased 20 percent in just the last month.11
  • Government. A massive breach of the US Office of Personnel Management in 2014–2015 resulted in the theft of sensitive information, including the Social Security numbers of 21.5 million individuals from employee and contractor background investigation databases.12

So what actions are authorities and other stakeholders taking on a broad scale to respond to the growing systemic nature of cyberthreats?

One major initiative is the World Economic Forum’s multi-stakeholder Partnering for Cyber Resilience initiative, launched at its 2011 annual meeting in Davos, Switzerland. Involving more than 100 experts, businesses, and policy leaders, the project’s goal is to “address global systemic risks arising from the growing digital connectivity of people, processes, and infrastructure.”13

After first focusing on raising awareness of cyber resilience among senior-level leaders, in 2014 and 2015, the members shifted their attention to the need for “a shared cyber resilience assurance benchmark across industries and domains.”14 To create a successful risk quantification model, they began by listing various types of models used within their organizations. The Monte Carlo method was predominant, but elements of other models were also deemed important, including:

  • Behavioral modeling
  • Parametric modeling
  • Baseline protection
  • The Delphi method
  • Certifications

The initiative’s exploration led to the framing of a cyber VaR concept “based on the notion of value at risk, widely used in the financial services industry.”15 Using a probabilistic approach, a cyber VaR model estimates the likely loss an organization might experience from cyberattacks over a given period—that is, “Given a successful cyberattack, a company will lose not more than X amount of money over a period of time with 95 percent accuracy.”16

In explaining its decision to develop a measure based on financial VaR, the Partnering for Cyber Resilience initiative noted, “The financial service[s] industry has used sophisticated quantitative modeling for the past three decades and has a great deal of experience in achieving accurate and reliable risk quantification estimates. To quantify cyber resilience, stakeholders should learn from and adopt such approaches in order to increase awareness and reliability of cyberthreat measurements.”17

The World Economic Forum stakeholders did not attempt to devise one specific cyber VaR model; instead, they suggested specific properties of a cyber VaR framework that industries and individual companies should incorporate into their own models. In this way, each organization can assess the components to determine applicability and impact to their own environment. That cyber VaR framework comprises these broad components (figure 2):

ER_3323_Figure-2

  • Vulnerability of existing assets and systems and the maturity of defending systems
  • Assets under threat, both tangible and intangible
  • Profile of attackers, including types (for example, state-sponsored vs. amateur and level of sophistication) and their tactics and motivations

The cyber VaR components, some of which can represent random variables (variables subject to “change due to chance,” such as frequency of attacks, general security trends, and the maturity of an organization’s security systems), are put into a stochastic model. The model is a statistical tool to estimate probability distribution incorporating one or more random variables over a period of time. Analysis of the dependencies between components can contribute to various models for estimating risk exposure.

Quantitative risk models represent an evolution in the management of cyber risk. However, when considering the cybersecurity realm, the use of risk models in general—and VaR specifically—invites an important question: Could a cyber VaR model pose a fundamental risk to organizations that choose to adopt it?

Key takeaway: The incredible complexity and ongoing expansion of the cyberthreat landscape are driving organizational initiatives to quantify cyber risk, much as financial institutions sought ways to quantify market risk in the burgeoning labyrinth of securities derivatives of the 1990s and early 2000s.

The importance of using risk models—judiciously

The answer to the question posed above hinges largely on the context within which an organization employs cyber VaR. We’ll next explore how three very different approaches to using the VaR model yielded three diverse outcomes.

VaR’s limitations were well known as far back as the 1990s, perhaps most famously in the 1998 fall of Long Term Capital Management (LTCM). LTCM’s demise

Exposed the limitations of VaR modeling and inadequacies of historical probabilities in predicting the future. Because Russia defaulted on its domestic (rather than foreign) debt, something that had never occurred before, LTCM’s VaR models assigned a probability of zero and incorrectly calculated the losses of this event. The miscalculation threw LTCM into a liquidity crisis, eventually leading to a bailout by a private consortium of banks and financial institutions.18

Despite this very public example of VaR’s limitations, the model continued to be popular and widely used in the financial services industry. Different varieties of VaR were used by different firms, but, typically, a firm’s stated risk approach involved daily VaR calculation at a 95 percent confidence level, as shown in figure 3.

ER_3323_Figure-3

The consequences of a laissez-faire attitude toward VaR outputs is illustrated by the experiences of a company we’ll call Firm X, which had taken on an aggressive investment posture with the endorsement of its board of directors. According to emails from the risk management team, the firm’s senior management disregarded its risk managers and failed to follow policies around its risk limits. Furthermore, management excluded certain risky principal investments from its stress tests without informing the board of directors, and it lacked a regular, systematic means of analyzing the amount of catastrophic loss that the firm could suffer from increasingly large, illiquid investments. And, in fact, Firm X eventually did suffer catastrophic losses that led to its bankruptcy.

Lessons learned in the years since Firm X’s demise suggest the value of a different approach to corporate governance and risk management. This is illustrated by the story of another large financial firm, which we’ll call Firm Y.

It starts when Firm Y leaders notice that the company’s profit and loss figures reveal that its mortgage business has lost money for 10 consecutive days. Watching these trends closely, senior executives and risk managers decide to delve deeper to find out why this is happening. They examine the data thoroughly, and then choose to collaboratively examine the firm’s trading positions.

With a strong financial governance process in place, Firm Y uses a variety of quantitative risk measures—ensuring that none outweighs its profit and loss statements. Executives are careful to not rely solely on any one calculation or input source. By weighing all available evidence regularly and, using their professional judgment, Firm Y’s leaders are likely to avert disaster by realizing they need to shed and hedge their mortgage-backed security positions.

How do the experiences of LTCM, Firm X, and Firm Y relate to quantification of cyber risk? One report points to shortcomings in board oversight of cybersecurity, concluding that boards are not paying close enough attention to security-related issues such as budgets, assessments, policies, roles and responsibilities, breaches, and even information technology risks.19

In describing the need for risk frameworks that address concerns about excessive reliance on risk models, José Manuel González-Páramo, an executive board member of a large global bank, said, “There has historically been an overreliance and mechanical use of models and external opinions. . . . Those models, measures, and opinions are still valid tools, but need to be used in a correct manner, and need to be complemented by other tools and, more generally, by expert judgment.”20

One outcome of the Partnering for Cyber Resilience initiative is for participants to collaborate on devising an approach to “near-real-time information sharing [that] can address data availability challenges and supply enough data to build statistical models.”

Viewed in this context, the effective use of cyber VaR and other models to quantify cyber risk involves challenges similar to those financial institutions often face, among them the perennial issue of data quality. Some fundamental data used in cyber risk models, such as frequency of attacks, can be difficult to acquire when the majority of cyber incidents go unreported.21Moreover, the extensive data sets needed to model the probability of cyberattacks are still being developed. One outcome of the Partnering for Cyber Resilience initiative is for participants to collaborate on devising an approach to “near-real-time information sharing [that] can address data availability challenges and supply enough data to build statistical models.”22 This undertaking, along with individual companies’ efforts to better understand and characterize their internal data—for example, quantifying the relationship between enterprise assets and the company’s revenue and profit picture—are vital to the efficacy of cyber VaR and other cyber risk quantification models.

Other challenges, more organizational in nature, include persistence of operational silos, lack of communication, and inadequate governance. Among these, inadequate governance, along with overdependence on the risk models, has perhaps the greatest potential to foster a false sense of security.

Key takeaway: Growing cyber risks are compelling organizations to consider the use of risk models. The valuable information that risk models such as VaR can provide should be weighted along with other inputs. To carefully structure and manage cyber risk activities, organizations must prevent any one input from having outsized influence.

Governing the use of models in cyber risk management

Among the desirable attributes of a cyber VaR model highlighted by the Partnering for Cyber Resilience initiative is the model’s potential to serve as an effective risk measurement tool for executives and decision makers. One key element of fulfilling this role is that the model be viewed through the lens provided by a company’s existing enterprise risk management framework, such as the Internal Control—Integrated Framework or the Enterprise Risk Management Integrated Framework developed by the Committee of Sponsoring Organizations of the Treadway Commission.23 The components of internal control typically include, at a high level:

  • The control environment overseen by the board of directors
  • A risk assessment taking into account operations, reporting, and compliance objectives and the potential impact of cyber risk on them
  • Control activities aimed specifically at managing cyber risks within the organization’s risk tolerance
  • Management of information and communications relating to cyber risk generally and specific cyber risk events
  • Monitoring activities that evaluate the effectiveness of internal controls that address cyber risks24

Viewing cyber VaR through this lens provides the board of directors and senior executives with an established, effective approach to communicating business objectives, their definition of critical information systems, and their appetite for associated cyber risks. In turn, that guidance from the board and senior management sets the tone—and establishes expectations—for rigorous cyber risk analysis across the enterprise.

By embedding cyber VaR within the broader enterprise risk management framework, Partnering for Cyber Resilience suggests, a company’s cybersecurity program can be reinforced with “continuous and proactive engagement from senior management.”25 In a 2015 speech, Cyril Roux, deputy governor (financial regulation) of the Central Bank of Ireland, expanded on the importance of management engagement when he outlined the bank’s expectations of financial firms with respect to cybersecurity. The themes Roux articulated provide helpful guidance for businesses in any industry seeking to strengthen their ability to detect, prevent, and recover from cyber intrusions. Among them:

  • The board should have a good understanding of the main risks. This will help board members effectively challenge senior management on the security strategy.
  • Perform risk assessments and intrusion tests. Organizations should perform cybersecurity risk assessments on a regular basis.
  • Prepare for successful attacks. Organizations build resilience through distributed architecture, multiple lines of defense, and readiness to mitigate impact on customers.
  • Manage vendor risk. Organizations should perform cybersecurity due diligence on prospective and existing outsourced service providers, and incorporate cybersecurity and data protection provisions into outsourcing agreements.
  • Gather information and follow leading practices. Organizations should follow and apply industry standards to their cybersecurity risk-management frameworks as appropriate for the scale and nature of their business and participate in industry information-sharing groups.
  • Educate staff. Organizations should address the “human factor” through regular security awareness training for all staff.
  • Put robust IT policies, procedures, and technical controls in place. These include incident reporting and response plans, recovery and business continuity plans, patch management, and employee access rights.
  • Consider buying cyber insurance. Organizations may consider evaluating the possibility of using cyber insurance as a partial risk-mitigation strategy.26

The importance of the first theme in the list above cannot be overstated. The board and senior management should challenge one another to critically analyze and weigh all risk inputs. Key elements of board risk oversight include:

  • Communication between the board of directors and members of senior management
  • Communication among the board of directors, board committees, and board advisors
  • Efficient coordination through a straightforward risk management process uncluttered by too many participants
  • Expecting the unexpected through activities such as discussion and analysis of possible risk scenarios with the management team27

The last of these four items points to an opportunity for boards to actively engage their management teams in reviews of various risk scenarios. This approach can help boards understand whether the management teams are taking effective action in their risk management processes and can identify areas where improvement is needed.

Some boards may assign responsibility for risk management oversight to their audit committees. They may also want to consider forming a stand-alone cyber risk oversight committee that engages regularly and directly with executives across the organization who are tasked with cyber risk management.

Education of boards, and of senior executives, about cyber risks is central to strengthening directors’ roles in addressing these threats. Tools such as The cyber-risk oversight handbook, published by the National Association of Corporate Directors (NACD),28 and guidance from sources such as Managing cyber risk: Are companies safeguarding their assets?, published by NYSE Governance Services,29can be useful in such efforts.

Key takeaway: Boards and senior management have an increasing responsibility to monitor their organization’s cybersecurity posture, provide oversight of cybersecurity strategy execution, and be prepared to respond to investor, analyst, and regulator questions about actions taken around cybersecurity. Cyber VaR and other risk inputs play a valuable role in fulfilling that responsibility.

Learning from the past to prepare for the future

Business leaders increasingly recognize that quantifying cyber risk is essential to understanding its potential consequences and allocating resources to protect digital assets. As we have seen, whether dealing with financial or cyber risks, risk models can play an important role in addressing threats. Models aid in identifying and evaluating data patterns and trends, a key dimension of the quantification process, along with sound governance processes, available risk data, and skilled cybersecurity and analytics specialists.

At the same time, relying too heavily on the models while ignoring or subordinating other considerations, can open the door to disastrous consequences. Instead, it is important to develop well-defined cyber risk models that align with the nature of a given business.30 Companies can translate the outputs from these risk models into simple-to-understand concepts that can be used to initiate frank risk-reward conversations across various levels of management and the board. The concepts can help increase these stakeholders’ understanding of both the dangers and potential opportunities associated with cyber-related risks in the context of business innovation and growth. In conveying these concepts, it is important to avoid creating a false sense of precision about the models, especially given the lack of empirical data available for certain model inputs.

By keeping the role and importance of models in context when applying them to a cyberthreat environment, businesses and regulatory authorities can enhance their risk intelligence and improve their stewardship in the interest of investors and customers. DR

Credits

Written by: Ash Raghavan, Adam Thomas

Cover image by: Lucy Rose

Endnotes
    1. Joe Nocera, “Risk mismanagement,” New York Times Magazine, January 2, 2009, http://www.nytimes.com/2009/01/04/magazine/04risk-t.html?_r=1. View in article
    2. Mike Billings, “The daily startup: Increased spending in cybersecurity drives funding surge,” Wall Street Journal, February 17, 2016, http://blogs.wsj.com/venturecapital/2016/02/17/the-daily-startup-increased-spending-in-cybersecurity-drives-funding-surge/. View in article
    3. Research shows that risk tolerance changes with context. For example, stock market investors are more likely to be tolerant of larger risks when the market is high than when it is low. This may seem like common sense, but it helps to frame why some executives do not heed the risk models that they themselves implement. For more information, see Yao et al., “Changes in financial risk tolerance, 1983–2001,” Financial Services Review 13, no. 4 (2004): pp. 249–266. View in article
    4. Investopedia, “Value at risk—VaR,” http://www.investopedia.com/terms/v/var.asp#ixzz436g0659c, accessed May 6, 2016. View in article
    5. Nocera, “Risk mismanagement.” View in article
    6. “Black swan” is a metaphor coined by risk analyst Nassim Nicholas Taleb to describe highly improbable events with outsized impact, in his book, Fooled by Randomness: The Hidden Role of Chance in Life and in the Markets, Incerto series, book one (New York: Random House Trade Paperbacks, 2005, 2nd edition). View in article
    7. Sam Fleming, “Market watchdog warns on danger of cyber attack,” Financial Times, August 24, 2014, https://next.ft.com/content/82519604-2b8f-11e4-a03c-00144feabdc0. View in article
    8. Depository Trust & Clearing Corporation, “Over 60 percent of risk managers at financial services firms believe probability of a high-impact event has increased, according to new DTCC survey,” December 1, 2015, http://www.dtcc.com/news/2015/december/01/financial-services-firms-believe-probability-of-a-high-impact-event-has-increased. View in article
    9. David Sanger, “Utilities cautioned about potential for a cyberattack after Ukraine’s,” New York Times, February 29, 2016, http://www.nytimes.com/2016/03/01/us/politics/utilities-cautioned-about-potential-for-a-cyberattack-after-ukraines.html?smprod=nytcore-iphone&smid=nytcore-iphone-share&_r=0. View in article
    10. US Computer Emergency Readiness Team, “Alert (TA16-091A) ransomware and recent variants,” March 31, 2016, https://www.us-cert.gov/ncas/alerts/TA16-091A. View in article
    11. Barbara Vergetis Lundin, “Oblivious in energy: Cyber attacks more successful than ever,” SmartGridNews.com, April 8, 2016, http://www.smartgridnews.com/story/oblivious-energy-cyber-attacks-more-successful-ever/2016-04-08. View in article
    12. US Office of Personnel Management, “Cybersecurity Resource Center: Cybersecurity incidents,” https://www.opm.gov/cybersecurity/cybersecurity-incidents/, accessed April 8, 2016. View in article
    13. World Economic Forum, Partnering for cyber resilience towards the quantification of cyber threats, January 2015, http://www.weforum.org/reports/partnering-cyber-resilience-towards-quantification-cyber-threats. View in article
    14. Ibid. View in article
    15. Ibid, p. 12. View in article
    16. Ibid. View in article
    17. Ibid. View in article
    18. Amy Poster and Elizabeth Southworth, “Lessons not learned: The role of operational risk in rogue trading,” Risk Professional, June 2012. View in article
    19. Jody Westby, “How boards and senior executives are managing cyber risks,” Carnegie Mellon University CyLab, May 16, 2012, http://www.hsgac.senate.gov/download/carnegie-mellon-cylab-cybersecurity-report. View in article
    20. José Manuel González-Páramo, “Rethinking risk management: From lessons learned to taking action,” Risk and Return South Africa Conference, March 4, 2011, https://www.ecb.europa.eu/press/key/date/2011/html/sp110304_1.en.html. View in article
    21. Center for Strategic and International Studies and McAfee, Net losses: Estimating the global cost of cybercrime, June 2014, http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf. View in article
    22. World Economic Forum, Partnering for cyber resilience, p. 15. View in article
    23. COSO, “Guidance on internal control,” http://www.coso.org/ic.htm, accessed May 6, 2016. View in article
    24. Mary Galligan and Kelly Rau, COSO in the cyber age, Committee of Sponsoring Organizations of the Treadway Commission and Deloitte, January 2015, p. 3, http://www.coso.org/documents/coso%20in%20the%20cyber%20age_full_r11.pdf. View in article
    25. World Economic Forum, Partnering for cyber resilience, p. 15. View in article
    26. Cyril Roux, “Cybersecurity and cyber risk,” address to Society of Actuaries in Ireland Risk Management Conference, Dublin, September 30, 2015, http://www.bis.org/review/r151002d.htm. View in article
    27. David A. Katz, Boards play a leading role in risk management oversight, Harvard Law School Forum on Corporate Governance and Financial Regulation, October 8, 2009, https://corpgov.law.harvard.edu/2009/10/08/boards-play-a-leading-role-in-risk-management-oversight/. View in article
    28. National Association of Corporate Directors, Cyber-risk oversight handbook, June 10, 2014, https://www.nacdonline.org/Resources/Article.cfm?ItemNumber=10688. View in article
    29. NYSE Governance Services, Managing cyber risk: Are companies safeguarding their assets?, https://www.nyse.com/publicdocs/nyse/listing/NYSE_Governance_Services_Managing_Cyber_Risk.pdf, accessed May 6, 2016. View in article
    30. One example of a tailored approach to quantifying cyber risk is provided in “The hidden costs of an IP breach” elsewhere in this issue of Deloitte Review, in which the authors demonstrate a scenario-based method for anticipating the impact of a particular type of cyberattack an organization could experience. See Emily Mossburg, J. Donald Fancher, and John Gelinne, “The hidden costs of an IP breach: Cyber theft and the loss of intellectual property,” Deloitte Review 19, July 2016, http://dupress.com/articles/loss-of-intellectual-property-ip-breach. View in article
Show moreShow less

Topics in this article

Deloitte Review , Governance , Cyber risk

Deloitte Consulting

Learn more
Download Subscribe

Related

img Trending

Interactive 3 days ago

Ash Raghavan

Ash Raghavan

Ash is a principal in the US Deloitte Advisory practice and the Cyber Center of Excellence Leader for Deloitte Global Risk Advisory. He has worked in a wide variety of industries, but has primarily focused in financial services the past six years. Ash has over 14 years of experience and specializes in Operations Risk and IT Risk Management consulting. He has helped clients establish enterprise risk management programs, perform enterprise wide risk assessments, develop risk management policies, deploy technology solutions, and design and implement infrastructure security solutions.

  • araghavan@deloitte.com
Adam Thomas

Adam Thomas

Principal | Deloitte Risk & Financial Advisory

Adam, principal, Deloitte & Touche LLP, is the Hybrid-Operate leader for Deloitte Risk & Financial Advisory. In his role, He leads the growth and implementation of Advisory’s Operate and Hybrid services, assets, and solutions. Over the course of his career, He has been involved in developing many of our hybrid-operate solutions in the cyber security, risk, and technology domains, leading both the development and scaling of these solutions as well as their go-to-market. Adam has more than 25 years of experience in the field of information technology and professional services, with a focus on helping design and implement information technology risk management and cyber security programs for many of Deloitte’s regulated, global financial services clients. He frequently provides counsel to senior leaders and boards of some of Deloitte’s largest banking and insurance clients on various technology, risk, and cyber-related matters. Adam received a bachelor’s degree in Business Administration from Miami University in Oxford, Ohio.

  • adathomas@deloitte.com
  • +1 602 234 5172

Share article highlights

See something interesting? Simply select text and choose how to share it:

Email a customized link that shows your highlighted text.
Copy a customized link that shows your highlighted text.
Copy your highlighted text.

Quantifying risk: What can cyber risk management learn from the financial services industry? has been saved

Quantifying risk: What can cyber risk management learn from the financial services industry? has been removed

An Article Titled Quantifying risk: What can cyber risk management learn from the financial services industry? already exists in Saved items

Invalid special characters found 
Forgot password

To stay logged in, change your functional cookie settings.

OR

Social login not available on Microsoft Edge browser at this time.

Connect Accounts

Connect your social accounts

This is the first time you have logged in with a social network.

You have previously logged in with a different account. To link your accounts, please re-authenticate.

Log in with an existing social network:

To connect with your existing account, please enter your password:

OR

Log in with an existing site account:

To connect with your existing account, please enter your password:

Forgot password

Subscribe

to receive more business insights, analysis, and perspectives from Deloitte Insights
✓ Link copied to clipboard

Deloitte Insights and our research centers deliver proprietary research designed to help organizations turn their aspirations into action.

Deloitte Insights

  • Home
  • Topics
  • Industries
  • About Deloitte Insights

DELOITTE RESEARCH CENTERS

  • Cross-Industry
  • Economics
  • Consumer
  • Energy & Industrials
  • Financial Services
  • Government & Public Services
  • Life Sciences & Health Care
  • Tech, Media & Telecom
Deloitte logo

Learn about Deloitte’s offerings, people, and culture as a global provider of audit, assurance, consulting, financial advisory, risk advisory, tax, and related services.

© 2025. See Terms of Use for more information.

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ("DTTL"), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as "Deloitte Global") does not provide services to clients. In the United States, Deloitte refers to one or more of the US member firms of DTTL, their related entities that operate using the "Deloitte" name in the United States and their respective affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see www.deloitte.com/about to learn more about our global network of member firms.

  • About Deloitte
  • Terms of Use
  • Privacy
  • Data Privacy Framework
  • Cookies
  • Cookie Settings
  • Legal Information for Job Seekers
  • Labor Condition Applications
  • Do Not Sell My Personal Information