APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Banking
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    Will Finance Automation Prove to be the Merger of the COO & CFO Roles?

    Amit Agrawal, Delivery Manager, NTT Data

    Asian Development Bank: Using Emerging Digital Technologies for the Common Good

    Shirin Hamid, CIO, & CTO, Asian Development Bank

    An In-depth Sight on Banking Technology

    Sandeep Khera, Chief Information Officer, XAC Bank

    Where was the Cloud when I was Younger?

    John Ferlito, Chief Technical Officer, Bulletproof

    Synergistic Opportunities for Banks and Fintech Companies

    Patrick Maes, CTO,

    Data Analytics: Bringing In A New Level Of Detail And Visibility

    David H. Robinson, SVP & Chief Information Officer, Lockton

    Demonstrating Business Value is Key To Success

    Mark Schlesinger, SVP & CIO, Broadridge

    Why Your Payments Strategy is the Key to Your Digital Future

    Tina Giorgio, President and CEO, ICBA Bancard

    right

    Cyber: Facing a new Frontier of Risk

    Jason Kelly, Head of Liabilities and Financial Lines for Greater China, Australasia and S.Korea, AIG

    Tweet
    content-image

    Jason Kelly, Head of Liabilities and Financial Lines for Greater China, Australasia and S.Korea, AIG

    The convenience of today’s increasingly connected world has brought with it a new form of risk: cyber. With news of large-scale cyber incidents appearing every few days, businesses around the globe are finally starting to sit up and take the subject seriously. If your organization faced an attack today, how prepared would you be?

    Following the WannaCry ransom ware attack in May 2017, AIG (where I serve as Head of Liabilities and Financial Lines for Greater China, Australasia, and South Korea) experienced an 87 percent increase in submissions for cyber insurance coverage. Businesses around the world are beginning to realize the full-scale enormity of cyber risk. This collective realization is spurring the urgent need for a larger discussion–one that takes place not in IT offices, but in the boardroom.

    Beyond IT

    More than 143 million people had their sensitive personal data put at risk by the Equifax data breach in May 2017. That’s 143 million personal financial histories potentially compromised. An investigation is ongoing, but the greatest critique lies in a major security flaw the company was first alerted to more than two months before any information was stolen.

    Following what many considered a lackluster response to the breach, the Chief Information Officer and Chief Security Officer were forced to resign. Consumer and industry backlash also prompted the CEO, Richard F. Smith, to step down. Stakeholders are no longer satisfied with IT taking the brunt of the blame.

    A cross-border risk

    Geographical borders are irrelevant in cyber space. In Asia, where 98 percent of the business sector is composed of small and medium-sized organizations, cybersecurity has yet to become a priority. Many of these companies face greater vulnerability to financial, reputational, and client loyalty disasters from risks that may not even be on their radar.

    Lawmakers are responding to this issue and are introducing requirements, which, in practical effect, impose compliance requirements that apply beyond country borders. For example, the EU’s General Data Protection Regulation (GDPR), due to come into effect on 25th of May, 2018, imposes obligations on any organization outside of the EU which offers goods and services to individuals in the EU. A boutique hotel in Hong Kong, therefore, which offers and provides services to guests who reside in the EU, may be caught within the GDPR’s ambit.

    Cyber attackers don’t discriminate

    Although the majority of cyber breaches in the news involve large corporations, it would be foolish to pretend that smaller businesses–and even individuals–are safe.

    The biggest change that companies can make is to shift their cyber strategies from post-breach repair to pre-emptive avoidance measures

    WannaCry, a worldwide ransomware attack in May 2017, impacted more than 230,000 computers. Rather than just targeting only large corporate networks, data from personal computers was also held hostage, with ransom payable in Bitcoin being demanded by the hackers to release the malicious block they had placed on the system. This kind of attack is just one of an ever-increasing number of cyber security incident reports–which have increased 300 percent from 2013 to 2016, according to the Hong Kong Computer Emergency Response Team Coordination Centre.

    Good fences make good neighbors

    No matter how carefully you plan and implement your own security measures, the risk doesn’t end there.

    The unfortunate truth is that your suppliers might be the weak link into your network. A hacker may find it easier to sneak past your cyber defenses by first breaking into a supplier’s weaker network, then posing as that supplier to gain access to your system.

    What can you do?

    The biggest change that companies can make is to shift their cyber strategies from post-breach repair to pre-emptive avoidance measures–preventing attacks before they happen. A good way to start is by assessing organizational risk from a cyber standpoint, and enlisting outside counsel from legal, accounting, and cyber security firms to develop mitigation plans.

    It’s also important to develop a data breach response plan, which includes assembling a team, checking network data segmentation and implementing a communications plan. A key element is to regularly test your response plan and ensure all key players stay informed of any updates or changes.

    Cyber insurance

    With cyber risks developing and evolving rapidly, cyber insurance coverage can improve the resilience of your organization in the event of a cyber breach or attack. Cyber insurance has evolved from providing coverage for settlements from customer litigation to addressing the financial costs related to cyber breach response. Coverage is now being expanded to include theft of company assets using electronic means.

    New types of coverage have been created to address 21st century exposures, including coverage for payments related to extortion from malware viruses such as WannaCry. These policies also offer legal services for determining the scope of the threat and negotiating a resolution.

    Another risk now being covered is social engineering fraud, wherein a fraudster stakes out a company, gains detailed information of key personnel, then pretends to be either a trusted vendor or the CEO/CFO (or “fake president”) to induce company employees to send money to bank accounts controlled by the fraudster. Theft of crypto currencies such as Bitcoin and Ethereum is now also being included within the scope of modern crime insurance to cater to those companies beginning to use cryptocurrencies in their transactions and operations.

    The invisible risk

    Cyber risk stands as a new and evolving threat you probably haven’t fully appreciated. It can attack you from multiple directions and come from sources halfway around the world. No matter your level of preparedness, it’s nearly impossible to completely defend yourself–or your company–against a motivated and ever-evolving threat.

    In 2016, AIG insured 22,000 commercial clients against cyber-related risks and 22 million individuals against identity theft globally. Cyber risk is here to stay, and although nobody is 100 percent safe from a cyber attack, the smart money is being channeled into the proactive steps needed to protect businesses and bottom lines.

    tag

    Financial

    cyber attack

    Weekly Brief

    loading
    Top 10 Banking Technology Companies - 2020
    ON THE DECK

    Banking 2020

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Why Contact Centres are Becoming Strategic Hubs for Social Insight

    Why Contact Centres are Becoming Strategic Hubs for Social Insight

    Cindy Chaimowitz, GM Wholesale & Customer Service and Karen Smith, Head of Customer Service, Foodstuffs North Island
    Why Compliance Needs a Seat at the Strategy Table

    Why Compliance Needs a Seat at the Strategy Table

    David Koh, Head, Legal & Compliance (Singapore) and Operational Risk Management Country Lead, Perpetual Limited
    Streamlining Operations and Empowering Teams in Facilities Management

    Streamlining Operations and Empowering Teams in Facilities Management

    Shaye Rogers, Workflow Support Manager, Cushman & Wakefield
    Technocreativity: The Synergy Of Technology And Creativity

    Technocreativity: The Synergy Of Technology And Creativity

    Tran Nguyen Phi Long, Group Head Of Retail Marketing, Pnj Group
    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Sigit Triwibowo, Head Of It And Digital, Chief Technology And Digital, Ikea
    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Eiko Ando, E-Commerce And Digital Director, Pvh Corporation
    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Le Van, CTO, YODY Fashion
    Driving IT Transformation at Lactalis Australia

    Driving IT Transformation at Lactalis Australia

    Sabina Janstrom, Chief Information Officer, Lactalis Australia
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://banking.apacciooutlook.com/cxoinsights/cyber-facing-a-new-frontier-of-risk-nwid-5126.html