Chapter 4
Cybersecurity Policies and Procedures

The Institute for Risk Management (IRM) Elliot Bryan, IRM and Willis Towers Watson, UK Alexander Larsen, IRM, and President of Baldwin Global Risk Services Ltd., UK

Tom, the CEO, was surprised. He challenged his chief risk officer, Nathan, and chief information security officer, Maria: “Are you telling me there is not one but six types of policies I need to sign off for cyber risk?” The two answered in tandem: “Yes! Social media, ransomware, cloud computing/third-party vendors, Big Data analytics, the Internet of Things, and bring-your-own-device (BYOD)/mobile devices.”

Social Media Risk Policy

Social media is an Internet-based communication tool and platform that increases and enhances the sharing of information and media. It is often overlooked as an area of risk by organizations that underestimate its potential negative impact—particularly on reputation.

A McDonald’s social-media effort is one example of a known social media risk being realized. The fast-food leader set up the hashtag #McDstories on Twitter to encourage users to share and promote positive stories about the restaurant. It didn’t take long for people to use the hashtag to post mostly negative stories of their experiences, derailing the campaign and embarrassing McDonald’s.

Understand Your Social Media Risks

Currently, there are literally thousands of social media platforms with over 2 billion active users. These include forums, blogs, networking sites, and image/video-sharing sites.

From a risk perspective, there are two key areas that companies on social media are exposed to that need to be considered. These are:

  1. Employee use of social media by mobile phone or computer exposing the organization to risk (e.g., intellectual property and data leakage, viruses, password loss).
  2. Corporate use of social media such as having a Twitter account or Facebook profile exposing the organization to risk (e.g., negative posts about your organization, campaigns backfiring, inefficient use of social media).

Prepare for Your Social Media Policy

The best form of prevention is for your organization to be well prepared before it enters into the social media sphere. Six preparations are recommended:

  1. Engage a multidisciplinary team. Since social media affects a wide range of functions, an effective strategy should bring together senior representatives from human resources (HR), legal, information technology (IT), risk, and any other affected functions.
  2. Clarify the objective of using social media. For example, to improve reputation, attract talent, increase sales, or improve customer engagement.
  3. Undertake a risk assessment.
  4. Obtain senior management mandate and commitment.
  5. Understand legal implications of the do’s and don’ts, monitoring of staff, and disciplinary action. This is where having the legal department on your team can be useful.
  6. Train all staff in the basics of the social media because media policy is essentially useless without the right training.

Choose between Social Media Policy Options

There are a number of options and considerations when creating a social media policy. These include how many policies to have and how extensive they should be. Should it even be called a policy? Employees are hardly likely to feel enthusiastic about a policy, so perhaps social media guidelines or something along those lines may be more appropriate.

Choose between One versus Many Policies

Decide if your organization needs to write one complete social media policy that addresses all currently available social media, or write many policies as you need them. It may seem excessive to have a policy for each network, and indeed, a company may choose to include these into one policy; however, it is important to understand the different impacts each network may have on the company.

Something to keep in mind is that when a company has multiple social media policies, it can become difficult to keep updated. Social Media networks update their content, features, and terms and conditions on a regular basis, and having specific policies would require them to keep up to date with all these changes.

For many companies, having separate policies may be critical. Military, police, IT companies, health care, and political parties, for example, may want to be very specific with regard to what employees can’t do or share online. Loss of sensitive data, such as patient records, staff addresses, political views, and so on, could lead to major reputation loss, danger to staff, or breach of legal requirements.

For other companies, however, it could be more beneficial for a company to have a social media guidance policy that focuses more on behavior and refers to all social media.

Choose between Format Options

Social media policies range from being extensive documents to being short and to the point. There is no right or wrong approach to this, and it will all depend on an organization’s industry, organizational culture, their risks, and motivations for participating in social media. Words and phrases that are familiar from other policies or visions within the organization may be a great way for staff to remember and understand the policy, too.

Examples of Social Media Policies

Rather than going through one or two examples of policies, it is recommended that you look online. There are over 100 policies from various organizations available online from Social Media Governance, a web site created by technology advisor Chris Boudreaux (www.socialmediagovernance.com/policies/). Some examples include:

  • Employee Code of Conduct for Online Communications
  • Employee Code of Conduct for Organization Representation in Online Communications
  • Employee Blogging Disclosure Policy
  • Employee Personal Blog Policy
  • Employee Personal Social Network Policy
  • Employee LinkedIn Policy
  • Corporate Blogging Policy (including guidelines for comments)
  • Corporate Facebook Brand Page Usage Policy (including guidelines for public comments and messages)
  • Corporate Twitter Account Policy
  • Corporate YouTube Policy (including guidelines for public comments)
  • Organization Password Policy

Finding the right combination from these examples can help organizations cover all three major social media risk categories (i.e., personal, employee, and corporate use of social media).

It is considered a leading international practice to have at least two social media policies: one for employees using social media for their job and the other for employees using social media in their personal lives. Recommendations on content for both types of accounts are covered in the boxes “Personal Social Media Policy for Employees” and “Social Media Policy for Corporate Accounts.” This first is for employees’ individual use of social media. It focuses on employees’ personal use of social media and should give employees information about what they can and cannot say about your organization on their personal site.

A second policy focuses on official professional and corporate social media activities. This should cover everything from defining the team to articulating roles and responsibilities, establishing branding guidelines, and becoming clear about what internal and external policies must be complied with.

Ransomware Risk Policies and Procedures

The year 2016 has often been described as the year of the ransomware attack. In just the first three months of 2016, attacks increased tenfold over the entire previous year, with reported victim costs at more than $200 million.1 Ransomware is a type of malware that is used by an attacker to effectively kidnap an organization’s data and prevent it from using it by encrypting it. This renders your data and files useless until you gain access to the decryption key, for which the attacker will demand a ransom. Attackers know that organizations are becoming more dependent on data for their organization to function and the motivation for hackers to launch an attack increases as the financial value of data is increasing on the black market (also commonly referred to as the “dark web”).

Here are a few examples of known recent ransomware attacks:

  • Attacks on U.S. police departments—various U.S. police departments have been hit, losing data on open cases.2
  • Attack on the University of Calgary, Canada, and Brunel University in London—the University of Calgary was forced to pay approximately C$20,000. The attack encrypted all of the university’s e-mails and files.3
  • Hollywood Hospital in Los Angeles paid a ransom of $17,000 after having lost access to all of its data and faced an extortion demand of $3.4 million.4

Understand Your Ransomware Risks

Ransomware is often spread through opening infected e-mail attachments, programs, and compromised web sites. An attacker will often try and persuade an unsuspecting employee to inadvertently download ransomware, usually by displaying messages on a web site and directing them to take an action to resolve a fictitious virus. It is this very action that downloads the ransomware onto the computer and permeates your organization’s network.

An attacker will often send a spam e-mail out to tens of thousands of unsuspecting victims with no real intended target, until an employee accidentally downloads the ransomware. These e-mails can quite often bypass anti-spam filters. The user then receives a message that pops up on their PC stating that their files have been encrypted, or “this operating system has been locked for security reasons.” These e-mails will then usually place a demand (usually in online currency bitcoin) to settle the ransom over a short time period (usually with a ticking clock) in exchange for the decryption key.

It is at this point that your organization faces a choice to either pay the ransom or attempt to negotiate with the attacker. Both options are undesirable. If, for example, the attacker exploits a vulnerability in your organization’s computer network and your organization pays the ransom at the first time of asking—then there would be nothing to stop the attacker exploiting that vulnerability again and sustaining repeated attacks. There is also no guarantee that the attacker will pass on the decryption key, after having received a ransom payment. If the affected organization chooses to negotiate, they also lose access to critical data for that period of time, which could result in a paralysis of organization operations and loss of revenues.

How Cybercriminals Spread Ransomware

New methods to spread ransomware are constantly being innovated. Only prevention via a robust cyber risk management system—including employee education—can help your organization manage ransomware risk effectively. The methods commonly used by criminals include:

  • Spam e-mail campaigns.
  • Bypassing vulnerable software and password protection.
  • Internet traffic redirecting targets to malicious web sites, very commonly from legitimate web sites.
  • SMS messages (targeting mobile devices).
  • Legitimate web sites that have malicious code injected into their web pages.
  • Drive-by downloads, a user inadvertently visiting a web site that is running malicious code.5

Prepare for Your Ransomware Policy

Your policies and overriding message should make it clear from the outset that protection across ransomware threats is the responsibility of all employees and not just the IT security function.

Be Proactive

As ransomware attacks are becoming so frequent, these policies are framed on the presumption that it is more a case of when, and not if, your organization is targeted.6 The purpose of this key policy content is to enable the organization to be proactive in preventing avoidable threats to your organization from ransomware attacks. Ransomware attacks are often sophisticated enough to bypass defensive IT anti-virus software, so it is vital that capabilities are deployed across the entire network to identify and contain the malicious activity.

Education, Education, Education

Run regular—at a minimum every three to six months—phishing e-mail tests with all employees, and mandatory training for all new employees. A training module for a large organization could also include a set of e-mails with unsolicited web links, and the employee has to decide which ones to avoid. Help employees become part of the security process, perhaps by getting them developing posters to increase employee awareness of ransomware attacks.7

Have a Clear Internal Escalation Procedure

Ensure that employees know where to send a suspicious e-mail, including on how to mark the e-mail header to avoid them inadvertently passing the virus to someone else.

Choose between Ransomware Policy Options

While an organization might want to focus on having a single policy (including IT and employee best practices), it may be worth having separate ones to avoid diluting the importance of having buy-in your employees. While leading practice IT hygiene can underpin the success of the employee policy, it is important to realize that the IT and employee practices must work together, as a weakness in either policy will undo all of the good work that you have done in the other.

Employees are often cited as the weakest link in IT security management.

Cloud Computing and Third-Party Vendors

Cloud computing can offer many operational efficiencies and can greatly enhance your organizations access to resources. Typically, a cloud provider hosts a network of remote servers that store, manage and process huge volumes of data on the Internet. This offers an alternative to an organization using the limited space and flexibility of a hard drive. Examples of cloud services include Google Drive, Apple iCloud, Dropbox, and Amazon Cloud Drive. Key benefits include:

  • Flexibility. Employees can access data from servers remotely that aren’t hard-wired in-house servers, thus creating a more flexible and mobile work lifestyle for your organization. Cloud resources are scalable for large corporations and affordable for small ones.12
  • Cost savings. Hard-wired IT infrastructure is costly to implement and may not offer the return on investment that had been anticipated. Cloud providers often operate on pay-per-use models that ensure that you are allocating your resources efficiently.13
  • Reliability. Cloud computing allows your organization to benefit from the cloud provider’s economies of scale. The cloud provider is possibly more likely to be able to provide 24/7 support in the event of an outage, and have the expertise in their staff to support the infrastructure.14
  • Enhanced security. While there are risks that come with trusting the cloud provider’s network security, their security and encryption capabilities often supersede most organizations’ internal security capabilities.15

Understand Your Cloud Computing Risks

The three primary risks that emerge related to cloud computing emerge from Internet dependency, concentration of data, and poorly executed contracts. Internet dependency is a risk that seems unavoidable in today’s digital business world. An Internet outage can prevent and delay important business functions, including transactions. While outages from Internet service providers can cause outages, cloud-computing sites can also go down. Even a temporary interruption of service can cause major problems for clients.

An organization that relies on cloud providers also relies on a third party to safeguard their centralized data. If the cloud provider’s network is compromised, this could result in the client’s loss of access to data, resulting in a damaged reputation. Using a cloud provider that does not adequately protect data can have tremendous negative consequences for organizations, employees, and customers.

Additional risk can emerge from weak service contracts with a cloud provider. Once an agreement is signed, it is very difficult to resolve any problems it causes or fails to address. Should anything go wrong, organizations will, at best, suffer from being stuck in a fractured service relationship. In a worst-case scenario, a client organization can face unexpected liabilities.

Prepare for Your Cloud Computing Policy

Clarify the purpose of your cloud computing policy as to how your organization may reap the benefits of using a cloud service while limiting the threats such as reputation loss and liabilities (should the service not perform as expected). It is vital that organizations both procure cloud provider services effectively and understand the contract language and negotiate key terms.

It is vital that you procure your cloud services and achieve a customer agreement and service level agreement that enables your organization to achieve its desired outcomes, prevent disputes and ensure that your organization does not assume all of the risk should the cloud fail. Getting the front-end processes right during the procurement stage is key in preventing problems further down the line and helps migrate your applications to the cloud successfully. More detail is provided below.16

Procure Cloud Provider Services Effectively

Some key processes that can help you procure cloud providers effectively are discussed in detail in this section.

Identify Your Desired Outcomes from a Cloud Provider

Issue an invitation to tender (ITT) that communicates your key desired outcomes to your chosen short list of providers. This could be for a migration of your application software to a state-of-the-art data center, enhanced cost savings, and access to better IT security and reliability of organization continuity, or a combination of all three. This will help your organization narrow your short list.17

Review

Request and review your shortlisted providers’ standard contracts. Rank these contracts with the assistance of a legal advisor in terms of favorability.18 Do thorough due diligence, and ensure that they retain security certification, and have positive audit results. Review your cloud providers’ security, privacy, and data storage policies.

Be Selective

Consider only providers that have agreed to meet your outcomes and make this a condition of your contract.19

Scope

Have a precontractual scope with your chosen provider. Agree on a transition plan for moving applications to the new virtual environment. Discuss scenarios precontract and understand who would be liable in the event of something going wrong. Identify key owners for the various tasks and operate on deadlines. Ensure that the project is only finished when applications are successfully transferred to the cloud and organization as usual is achieved. Obtain evidence that your provider can meet these objectives.20

Draft

Start drafting the contract by using incentivized payment provisions that are linked to the predetermined outcomes. Use acceptance provisions to hold your cloud provider accountable. Remove “Agreements to Agree” from standard contracts, as these are not operative, potentially discharging the cloud provider’s liability.21 Check the architecture works. Only sign the contract as soon as organization as usual has been achieved and the migration is complete and works effectively.22

Clarify

Understand the contract language and negotiate key terms. As is common with an industry in its infancy, there are frequently errors in cloud contracts. These contracts (especially with larger providers) tend to be heavily weighted in their favor. There are also the added complications of finite case law and the fact that the choice of law governing these contracts is often overseas meaning that the settlement of a dispute could potentially be very costly.23 This applies in particular, if your organization is the controller for personal data such as:

  • Account numbers and balances of clients.
  • Personal information of your customers.
  • Personal information of employees.
  • Medical history of patients if you’re a health care provider.

It is vital that you contract with providers with best-in-class security and the contract does not totally exonerate them from liability in the event of a data breach. It is also better to have a bespoke contract rather than a standard contract, as quite often cloud providers can change their standard terms and post them on their web site without necessarily warning their customers.24

Generally, the customer service agreements are usually split into four sections:

  • Customer agreement
  • Acceptable use policy (AUP)
  • Service-level agreement
  • Privacy policy25

The box “Customer Agreement Key Content” highlights key content that you should pay close attention to when negotiating a contract with a cloud provider.

Big Data Analytics

The benefits of Big Data analytics are being felt across many organizations. While these are numerous, the key benefit is the enhanced capability of being able to collect large volumes of data and apply analytical tools, to help assist organizations in identifying where to focus their marketing efforts and allocate resources efficiently.

Understand Your Big Data Risks

While the use of Big Data analytics unlocks huge possibilities for organizations (i.e., opportunities), it can also open organizations to new threats. Hackers are aware of this shift and are growing both more persistent and more savvy in how they unlawfully access networks. There are two main types of threats:

  1. Increased risk of privacy breaches. Big data analytics relies on the aggregation of huge amounts of personal data. A personal data event could result in reputational damage, regulatory fines, and potential liabilities to those data subjects.
  2. Regulatory compliance. Globally, there are trends toward more onerous requirements in safeguarding personal data. The new EU General Data Protection Regulations, due to be enforced in May 2018, will impose requirements on companies to have a compliance-first approach to the use of data. Failure or negligence in providing the relevant safeguards can lead to regulatory fines of up to 4 percent of global turnover. Compliance projects can also drain productivity in achieving organization tasks.

Prepare for Your Big Data Policy

Clarify that the purpose of your big data policy is to not only be regulatory compliant and avoid unwanted headlines but to maintain factual and secure data that will help drive organization growth.37

Again, as this the case with ransomware attacks, organizations can opt to have individual IT and employee policies.

A significant number of data breaches occur through negligent employee practices, so it is vital that employees are full engaged and educated in good IT hygiene in securing confidential organization data and customer data.

While, there are numerous policies available, it is best practice to follow the “privacy by design” principle. Privacy by design requires an organization to minimize harm to a data customer by designing a set of rules and processes for acquiring and creating data, migrating that data into systems, and best practice storage and uses of that data.38 This is a key requirement for organizations’ subject to the EU’s new General Data Protection Regulation requirements that are due to be enforced in May 2018 and enforced by heavy penalties.

Big Data may mean certain amendments need to be made to existing or other organization policies.

The Internet of Things

The Internet of Things (IoT) has the potential to deliver untold benefits for organizations. McKinsey Global estimates that it can deliver between $2.7 billion and $6.2 trillion of value to the global economy by 2025, with the number of connected devices to exceed 50 billion by 2020.46 Essentially, IoT enables the linking together of physical “connected” devices via the Internet that help organizations collect data, complete tasks more efficiently, and thus develop and sell tailored customer solutions. The major advantage to an organization is the ability to use the vast amounts of data to collate big data analytics.

Understand Your IoT Risks

The Internet of Things means more connected devices, and a potential “wild west” type scenario in which a hack into one device can make it easier to hack into others.47 This is particularly poignant, as an organization may be fairly far removed from the chain in a device that gets hacked and yet suffer significant reputational damage even if your organization was not the initial target. Some examples:

  • In 2015 Fiat Chrysler had to recall of 1.4 million vehicles to fix a vulnerability that allowed an attacker to wirelessly hack into the vehicle.48
  • In 2014 a German Steel Mill blast furnace suffered massive damage, after hackers gained access to controls through hacking employee e-mails and gaining access to the plant’s office network.49
  • Categories of IoT threats include:
  • Data protection—huge sources of personal data are gathered from all aspect of an individual’s life, making them more easily identifiable. This creates potential liabilities, fines, and reputational damage.
  • More connected devices—increasing likelihood of a hack.
  • Speed of change—the speed at which devices become connected and the growth of IoT technology may outstrip the rate at which appropriate security controls of the connected devices are implemented. The organization may lose control of how many devices are connected to their data, leading to liabilities that have not been accounted for in risk registers. An example are smart meters, where mobile phones can be used to regulate temperature control within a home.50
  • Increased likelihood of outages—sheer volumes of servers communicating huge volumes of data traffic can overwhelm the server and lead to downtime.51
  • Security lags—unencrypted links are often used to communicate between devices.52

Prepare for Your “Internet of Things” Policy

Clarify that the purpose of this policy is to assist your organization to reap the opportunities from the Internet of Things by gaining a handle on the new risks that your organization will now face. The policy content should factor in security of the data that you collect on your own devices but also should include provisions for other organizations that operate the other connected devices.

Mobile or Bring Your Own Devices (BYOD)

The working environment is changing fast, and companies are responding to calls from employees for increased flexibility in their working practices. This is part of a tidal shift toward agile working, with employees choosing to centralize all aspects of their lives into a single device. In turn, companies are looking to reap the benefits of lower costs and increased employee productivity. These mutual benefits have led to staggering adoption rate of BYOD schemes by companies; it is estimated that around 85 percent of companies now allow employees to bring their own devices to work.57 There is, however, a darker side to BYOD58; it is inevitable that emerging work practices will lead to emerging risks, in particular around data protection.

Understand Your BYOD Risks

The principles of BYOD are largely around giving employees more freedom in how and where they work. The fact remains that the company, as a data controller, has overall responsibility for the data, yet it will retain significantly less control over an employee’s devices, than it would its own device.59 Employees are often seen as a weak link in the data security chain, and the risks of reputational damage are amplified. All of the positives benefits around increased productivity, or reduced hardware costs could soon be eliminated through a single oversight or irresponsible act.

The key risks associated with BYOD are as follows:

  • Accidental or intentional data breach leading to harm to customers, reputational damage, and fines.
  • Employees connecting to unsecured networks, opening up vulnerabilities.
  • Theft of sensitive corporate data and intellectual property, leading to missed opportunities and revenue loss.
  • Merging of end user data and corporate data.60
  • Interception of data between the personal device and corporate system leading to reputational damage and fines.61
  • Loss of device and hack.
  • Privacy regulations, use abroad could open up additional risks in relation to privacy regulations.62
  • Malware infection leading to data leakage and data corruption.63

Prepare for Your BYOD Policy

An enterprise-wide BYOD policy will assist your company in locking in the benefits of employee satisfaction, productivity, and reduced costs while avoiding potentially large-scale embarrassments. Following are some key steps that will help your company prepare toward developing a successful mobile device strategy.

Determine How the Mobile Devices Will Be Used

Be clear on how you expect the mobile devices to benefit your business.64 Companies should ask themselves if they want the devices to connect with the existing network infrastructure, process sensitive information or act as a tool to help your sales and marketing employees. This will assist you in determining the tightness of the control environment and levels of password protection required.65

Get All Company Functions to Contribute

It is vital that the BYOD policy has input across the company from Human Resources, Legal, IT, accounting and the employees.66 This is crucial in helping the company get a broader understanding of its emerging risks, underpinning the policy. It will also ensure wider accountability across the company, rather than being an “IT” issue. Consider using interactive games or tests to help employees truly understand the risks rather than getting them to search through pages of documents. They will, however, have to eventually read and fully understand the policy.

Understand the Emerging Risks

The implementation of BYOD should not introduce vulnerabilities into already secure networks.67 Be clear on agreements that you have with other companies and ensure that the BYOD does not contravene these agreements.68 The emerging risks can be documented, and can seamlessly link in with your other policies such as your overall IT security and social media policies to form the foundation of your policy.

Consider Mobile Device Management

Mobile device management solutions underpin secure BYOD policies and can assist in mitigating many of the merging risks. Examples of these solutions include SOTI MobiControl, Vmware AirWatch, Citrix Xen Mobile, and IBM MaaS360.69 It is crucial that these are procured carefully and matched with the objectives of the BYOD. Mobile device management can provide all-encompassing solutions such as enforcing a pass code, encrypting stored data, and wiping a device if it gets lost.70

Audit Your Data

Understand the data that you hold as an organization, consider how many sensitive data records that you hold, and be clear on which personal data are permitted to be processed on a personal device.

Separate End-User Data and Corporate Data

Cloud adoption is also increasing, and many end users may use their devices to store personal documents, contacts, and e-mails in iCloud.71 End users must be clear on the acceptable use of the cloud when adopting BYOD, to avoid leaking personal data into the cloud and accidental data breaches.72

Protect and Encrypt

All devices should retain a strong password, and two-factor authentication. Encryption should be used to store data on the device effectively, and locks should be in place should an incorrect password be entered in too many times. Support and guidance for the end user is crucial in this regard. Encryption at rest is a useful risk prevention procedure should a device be lost or stolen.

Employee Responsibility

An end-user agreement is essential in clarifying that personal data must not be shared. The end-user agreement illustrates the need for employees to be held accountable, and the signing of this agreement is a demonstration of their understanding of their responsibilities and the risks involved when adopting BYOD. They must also have clearly defined parameters as to how the devices can and should not be used.73 It is crucial that restrictive practices are communicated to the end user, with a support network available.74 The end-user agreement can be used in conjunction with the company’s security policy to cover the life cycle of the device, including loss scenarios, disposal, and when an employee leaves the company.75

Choose between BYOD Policy Options

It is vital that companies find a balance between achieving the objectives of the organization without compromising security. Your organization could choose one of the following options.

Disallow BYOD

This is the ultimate risk-avoidance measure. BYOD is fast becoming a work “norm” and preventing BYOD will limit the benefits that a company achieves and may result in employee frustrations and flouting the prohibitions on use.76

The “Do Nothing” Approach

Some companies may choose to offer this approach in order to enable extensive take up by employees or avoid stifling creativity and innovation. This is potentially dangerous in that it can lead to serious personal data leakage and a lack of control over their intellectual property, resulting in reputational damage and harm to customers.77

Corporate Devices Only

This option helps the company retain more control over their IT assets, policies, baseline security measures, and configurations. While this option ensures consistent security baselines and retained accountability within the organization, it can lead to increased costs per person and a higher number of connected devices.78

Have a Managed BYOD Policy

A managed BYOD policy documents the responsibilities and ensures accountability of the employee through the use of an end-user agreement. It allows employees flexibility but limits the introduction of new risks. The security controls, limitations of use, and types of devices used are largely dependent on the volume and sensitivity of the company data and how the device is intended to be used.79 Clear communication with employees is vital in helping them understanding the risks associated with using company data on mobile devices. The policy does need to be continuously monitored and improved where necessary with clear internal escalation points for queries by end users.

Examples of BYOD Policies

There are numerous BYOD policies available, many of which contain the following sections:

  • Acceptable use (end-user agreement)
  • Devices and support
  • Reimbursement
  • Security
  • Risks/Liabilities/Disclaimers80

Conclusion

The following cyber risk management statement represents those organization capabilities CEO and board expect to be demonstrated in terms of cyber risk policies.

Notes

About IRM

Founded in 1983 with a head office in London and international membership chapters, the Institute for Risk Management is a specialist institute that continues to develop professional risk qualifications, courses, events, and publications. In 2014, IRM hosted a major Cyber Risk summit and published Cyber Risk as member-led thought leadership research to give risk professionals the practical knowledge they need.

About Elliot Bryan, BA (Hons), ACII

Elliot is an associate and an account executive for Finex Cyber and TMT practice at Willis Towers Watson, London, United Kingdom. In this role, he specializes in advising on, negotiating, and placing cyber, professional indemnity for technology companies, and intellectual property insurance for clients, across a wide range of industry sectors. Elliot advises clients on program design, placement, and risk profiling with a particular focus on policy wording and coverage analysis.

He is a graduate of the University of Sheffield and an associate of the Chartered Insurance Institute.

About Alexander Larsen, FIRM, President of Baldwin Global Risk Services

Alexander is a strategic/enterprise and project risk manager who holds a degree in risk management from Glasgow Caledonian University and is a fellow of the Institute of Risk Management (IRM). He is also currently President of Baldwin Global Risk Services based in the United Kingdom.

He has 15 years of experience working in the United Kingdom, Middle East, and Asia, within risk management across a wide range of sectors, including oil and gas, construction, utilities, finance, and the public sector. He has considerable expertise in training and working with organizations to develop, enhance, and embed their enterprise risk management (ERM), project risk management (PRM), business continuity management (BCM), and partnership management processes.

He has attended conferences globally as an expert speaker and to run master classes and contributes articles to various risk publications. In 2015, he contributed a chapter titled “Implementing Risk Management within Middle Eastern Oil and Gas Companies,” based on his experiences from around the Middle East including Iraq, for the John Wiley & Sons publication Implementing Enterprise Risk Management: Case Studies and Best Practices.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset