Для тех, кто интересуется безопасным доступом к онлайн-играм, наш партнер предлагает зеркало Вавады, которое позволяет обходить любые блокировки и сохранять доступ ко всем функциям казино.

Insider Fraud: How to Identify and Prevent Internal Threats

Organizations of all sizes, across all industries have become data breach victims as cyber crooks become more sophisticated in identifying vulnerable targets.

buy cenforce online www.handrehab.us/images/patterns/jpg/cenforce.html no prescription pharmacy

Attackers can compromise an organization within scant minutes in 60% of breaches, reports the latest Verizon Data Breach Investigations Report. Still, insiders persist as one of the biggest fraud perpetrators, costing organizations globally about $3.7 trillion annually in 2014, estimates the Association of Certified Fraud Examiners. The puzzling question is this: With the advances in technology, why aren’t organizations preventing these incidents and why aren’t the offenders being nabbed earlier?

The answer to the insider fraud dilemma lies in a lag in robust risk-management technologies that help organizations identify and prevent insider fraud, especially in such industries as banking. With this type of breach, tracking behavior becomes a key component of managing risks and threats proactively. While basic data tracking isn’t new, what is fresh is grasping the internal behavior of employees in a real time, comprehensive view across multiple platforms and applications.

Unfortunately, disparate legacy systems that don’t share information easily create larger problems by limiting an organization’s ability to monitor across all systems. And siloed information makes it impossible to find “normal” employee behavior that should serve as a benchmark for day-to-day activity.

For example, banks must be on the lookout continually for employees who exhibit illegal behavior when, say, handling a dormant bank account, who are manipulating customer information or who collude with colleagues.

buy finasteride online www.handrehab.us/images/patterns/jpg/finasteride.html no prescription pharmacy

By benchmarking regular employee activity and leveraging link analysis to spot relationships across accounts or employees, banks also can monitor for and spot instances of employee negligence that can offer cyber crooks easy access to customer data.

Sophisticated surveillance technology exists that lets organizations monitor and detect suspicious behavior in real time, then analyze and develop an evidence trail. Organizations can use the following activities to help identify and prevent an internal threat before it escalates and triggers substantial monetary and brand damage.

  • Monitor all user activity: It is critical to establish what is normal and what is abnormal. Each organization has different user personas with unique activities considered “normal.” By defining organizational benchmarks for normal versus abnormal activity, risk managers can identify inconsistencies in employee behavioral patterns.
    buy abilify online www.handrehab.us/images/patterns/jpg/abilify.html no prescription pharmacy

    Visibility into user activity across applications and networks enables them to highlight incidents that warrant deeper analysis and determine threats.

  • Track behavior in real time: Rather than analyze data retroactively, organizations should adopt a solution which can alert from the moment data is captured from the corporate applications and networks. Long-lead systems or those heavily reliant on log-file data don’t allow for real-time tracking and often result in discovering a breach after the fact.

Enable searchability: Organizations can deploy a user-friendly monitoring system with Google-like searchability features with highly specific behavioral criteria. Moving beyond clunky legacy systems to technology that is intuitive eliminates user error and enables more advanced rule-based monitoring.

  • Record screen activity: Gaining visual evidence of illegal activity while it occurs is critical for use during an investigation. Technology that records screen-by-screen activity at the application level creates the comprehensive data trail needed for courtroom presentation.

A combination of these activities can assist organizations in identifying anomalies in employee behavior, track digital activities and contrast them with an employee’s normal routine or that of a peer group’s pattern. If incongruities appear, advanced risk-management technology develops a data trail and a case strong enough to stand up in court. Leveraging these measures, insider fraud can be discovered at an earlier stage to prevent customer data breaches and malicious attacks.

Staying Ahead of the Financial Industry’s Next Wakeup Call

The financial services sector is no stranger to stringent regulation. At the very least, financial institutions are audited every 18 months. But without a proper security posture, complying with the likes of the Payment Card Industry Data Security Standard (PCI DSS) and others doesn’t always have the dual benefit of protecting against breaches: the PwC 2015 Global State of Information Security report noted a 141% year over year increase in the number of financial services firms reporting losses of $10 million to $19.9 million.

This tells us a few things: first, compliance is all about a company’s interpretation of the rules, which can be bent and glossed over–compliance is, after all, a minimum standard to which firms should adhere. Additionally, regulation needs to have more teeth as security threats become more sophisticated and targeted. Most importantly, with the regulated ecosystem being so complex, institutions should identify the elements prescribed most frequently across compliance mandates and put solutions in place that meet them. While doing so won’t guarantee complete security, it will put firms in the best possible position to protect against attack while simultaneously satisfying auditors.

The Cost of Compliance

The 2014 SANS Financial Services Security Survey, which examines the drivers for security-related spending in the financial services industry, reports that 32% of organizations spend more than one quarter of their IT security budget on compliance mandates. Nearly 16% of respondents say they are spending more than 50% of their security budgets on compliance.

Unfortunately, this investment in compliance doesn’t translate to investment security dollars. In fact, the survey also demonstrates that certain drivers behind firms’ information security programs are competing for resources with compliance mandates; while 69% of respondents say that demonstrating regulatory compliance is a top driver, a majority also cited drivers that tie closely to that, including reducing risk (64%) and protecting brand reputation (51%).

To ensure investment in security and compliance are not mutually exclusive, it takes effort on both sides–firms should put more effective solutions in place, while regulators should have stronger directives to encourage firms to streamline those efforts.

Securing the Endpoint

Specifically, firms should put systems in place that address endpoint vulnerabilities, including insider threat and malware on the devices, rather than on network solutions. The same SANS report elucidates that endpoint vulnerabilities were the biggest causes of security incidents among financial institutions, with abuse or misuse by internal employees or contractors (43%) and spear phishing emails (43%) the most prevalent, followed by malware or botnet infections (42%).

It doesn’t take long to find explicit use cases that corroborate these findings. The JPMorgan Breach, which impacted nearly 76 million households, came down to a hacker that gained high-level administrator privileges. Put simply, the cause for breach wasn’t necessarily the sophisticated malware, but rather, the ritual IT administrator tasks that were compromised. Clearly, while perimeter technologies like firewalls can prevent certain types of external attacks, they cannot block malware that has already found its way onto endpoints within an organization. Layering proactive solutions will be critical to preventing serious threats from occurring.

Least Privilege: The One-Two Punch

Proactive solutions should incorporate layering elements like patching, application whitelisting and privilege management. Taking this defense-in-depth approach will enable financial organizations to more effectively protect against the spread of malware, defending their valuable assets and ultimately their reputation. The dual benefit? They will satisfy auditors.

The least privilege methodology in particular, which limits administrator privileges from individuals and grants them to certain applications instead, is broadly prescribed across multiple financial mandates in the United States–from PCI DSS, to Federation of Defense and Corporate Counsel (FDCC) to the Sarbanes-Oxley Compliance (SOX) mandate. For instance, the PCI DSS has a specific requirement to log activity of privileged users and states that employees with privileged user accounts must be limited to the least set of privileges necessary to perform their job responsibilities.

Internationally, the practice is even more strictly enforced. For instance, the Monetary Authority of Singapore (MAS) has technology risk management guidelines that detail a number of system requirements–such as limiting exposure to cyber and man-in-the-middle attacks – that would be very difficult to achieve without a least privilege environment. In fact, the document presents one section dedicated entirely to least privilege. Here, requirements encourage restricting the number of privileged accounts and only granting them on a ‘need-to-have’ basis. The guidelines also encourage the close monitoring of those who are given elevated rights, with regular assessments to ensure they are always appropriately assigned.

Ultimately, limiting privileged access limits hackers’ attack vector and also prevents staff from implementing sophisticated attacks like logic bombs, knowingly or unwittingly. At the same time, the practice will help achieve compliance, driving down unnecessary spending. While progress is being made collectively between firms and regulators, more can be done; regulators can bring endpoint security top of the priority list and firms can put in practice simpler elements for a strong architecture. A next high-profile security beach shouldn’t be the industry’s wakeup call.

Is Bigger Really Better? Pros and Cons of the Reinsurance Industry’s Recent M&A Wave

The reinsurance industry has recently seen a rise in mergers and acquisitions among some of its biggest players, such as Axis Capital Holdings Ltd. and PartnerRe Ltd. Faced with challenges like soft market conditions and impending regulation around the globe, many companies have turned to consolidation. Case in point: In 2014, acquirers spent $17 billion on property and casualty, multi-line insurance and reinsurance deals – the most since 2011, according to data compiled by Bloomberg.

Claude Lefebrvre, chief underwriting officer at Hamilton RE, described M&A as part of a cycle that tends to take place during the soft market. Last year, about 390 insurance transactions were announced for a combined value of almost $50 billion, making it the busiest year for deals since 2008. This begs the question: Is bigger actually better?

At a recent roundtable in Bermuda, a group of executives talked about the pros and cons surrounding the current spate of mergers and acquisitions in the reinsurance and insurance markets. The discussion noted that M&A may not be as beneficial to the reinsurance market as previously conceived, and looked specifically at the long-term benefits (or lack thereof), the potential for culture clashes among merged organizations and the impact of investors.

Here is what some of the conversation entailed:

Long-term benefits of M&A

With a rise in the number of consolidations, many smaller reinsurance companies are under pressure to make a deal sooner rather than later. But does this ultimately increase shareholder value, especially in cases of like-for-like companies?

Brenton Slade, chief operating officer at Horseshoe Group, believes there would be far less M&A activity if management teams took the time to look at the rationale behind the proposed deal and how it would benefit shareholder value over the long term. With this strategy, he believes we would see more money being returned to investors or being deployed into new product lines as opposed to just expanding equity bases.

As stated by Robert Johnson, president at Aon Benfield Bermuda, being a company with $10 billion of capital does not necessarily provide access to much more business than being a $5 billion size company. Potential challenges, such as ensuring companies have the right synergies and the loss of good employees, may outweigh the benefits of a merger.

Culture Clashes

A major issue seen with the rise of mergers is combining two company cultures and their legacy systems into one cohesive unit. A recent study from Xuber showed that cultural integration and incorporation of multiple systems was the biggest challenge faced by companies following M&A.

Issues such as determining what team members stay on, what the company will be called and where the company will be based are huge decisions and can cause a great deal of tension. The integration of existing data systems, legacy systems, contracts and processes is just as challenging.

Companies need to take culture into consideration when acquiring another organization and determining how they will mitigate issues that arise. This can also be used as an opportunity to refresh old legacy systems and integrate new data storage systems to replace outdated technologies.

Additionally, it poses an opportunity for smaller companies to have an advantage when it comes to the M&A process, as they have fewer systems in place and can adjust easier. Smaller companies are also at an advantage when larger companies merge, as they can capitalize on dislocated teams and bring in new lines of business.

Investor Impact

Some believe that investors, and their desire to increase their capital base, are driving much of the current M&A activity. Previously, investors wanted to manage performance; this has changed dramatically as investors have become less focused on performance or meeting certain return or risk policies. Now investors are less involved and often do not understand the reinsurance industry. They are simply looking to increase the size of companies and in turn their capital base, without looking at the long-term impact of consolidation or the benefits of having two smaller companies.

Will Things Keep Getting Bigger?

Bloomberg predicts that we will continue to see a rise in M&A activity as the demand for bigger and more diversified portfolios increases and companies see it as the only option to remain competitive. Smaller companies will likely feel the pressure to become involved and see it as the only way of securing any kind of substantial future.

On the other hand, this may present an opportunity for smaller companies to shine. As their larger competitors struggle with the challenges brought on by the M&A process and are not able to focus on day to day activities, smaller companies can produce higher quality work and scoop up some of the larger company’s lost talent.

The debate will likely continue as to whether the pros outweigh the cons, or vice versa, in the recent spate of M&A activity in reinsurance and insurance. It is yet to be seen that we can truly prove bigger is better. What do you think?

ERM Seen as a Strategic Advantage by Global Insurers

Global insurers’ level of satisfaction with their enterprise risk management (ERM) performance grew by 10 percentage points over the last two years (63% compared to 53%). This was highlighted by a 16-percentage-point increase in Asia Pacific (51% compared to 35%) and less pronounced in North America and Europe (with a seven-point increase), according to Towers Watson’s Eighth Biennial Global Enterprise Risk Management Survey.

According to the survey, 74% of global insurers said their executives and board members view the risk management function of their enterprise as an important strategic partner that adds value to the business. Notably, carriers that share this view are almost twice as likely to say they’re satisfied (73% compared to 38%) with their company’s ERM performance compared to those that believe ERM is merely a provider of risk assurance (18%) or for regulatory compliance (8%).

Insurers’ opinions of their ERM program were determined by factors such as clear links to business goals. In fact, carriers with ERM functions that are well integrated into their business planning noted higher rates of satisfaction (82%) than those without an integrated strategic plan (53%). Similarly, those with a risk appetite framework linked to specific risk limits expressed higher rates of satisfaction (76%) than their peers with no framework in place (50%).

“Companies that strive for strategic value in their risk management function — as opposed to simply using ERM for regulatory compliance — typically differentiate themselves, in part, by integrating risk management into their strategic decision-making process from the beginning,” Martha Winslow, senior consultant of the Americas P&C practice with Towers Watson, said in a statement. “Too often, senior management incorporates risk management later in the process or even after it is complete, when there’s not much chance of it influencing critical decisions.”

Towers Watson survey findings: