EFTA01201215
EFTA01201216 DataSet-9
EFTA01201241

EFTA01201216.pdf

DataSet-9 25 pages 1,246 words document
P17 D3 V15 V16 V11
Open PDF directly ↗ View extracted text
👁 1 💬 0
📄 Extracted Text (1,246 words)
Some name company EFTA01201216 Note on terminology I'm using a mix of insurance and bond lingo. Afaik there's no set terminology to use and we should end up using the one that makes buyers the most comfortable EFTA01201217 What We raise money from the financial market to allow companies to hedge their cyber security risk EFTA01201218 Why • Every company, regardless of their sophistication, has a security risk that cannot be eliminated • Insurance policies don't work because of lack of proper coverage, policy size and actuarial data EFTA01201219 How • We assess daily the Value at Risk of a company • We raise from the market anywhere between 3 to 10 the VaR and keep it in a special purpose vehicle • The company pays a coupon to the investors • If an incident does happen, the investors lose the principal or a part of it depending on the incident cost EFTA01201220 Va R (IN,, ( = inf {1 G : P(1, > 1) < 1 — = inffl R : FL(l) > Our goal is to calculate a which is the confidence score in (0, 1) in R In our case I is provided by the company and 'vetted' by us. a is a score based on the infrastructure risk and the company risk profile We raise from the market anywhere between 3*I and 10*I (in finance this is where banks are supposed to do montecarlo simulations or stress tests to see if they can handle that) EFTA01201221 Note on VaR VaR ignores fat tail risks, that's fine. To address those I think the only solution is to do a CAT-like bond based on the stock price of a company (or something like that) EFTA01201222 Risk correlation • To reduce the chances of investors losing the entire principal in case of an incident companies are split in tranches • Investors buy in a tranche containing uncorrelated companies • Tranches are rated like bonds (AAA to junk) based on the risk of each tranche (as the combination of the risk of the companies in each tranche) EFTA01201223 Why tranches? Mostly because of the central limit theorem.. "Towards infinity the mean of a sufficiently large set of independent random variables approximates a normal distribution" (given certain conditions) Intuitively it means that if you get enough companies their average risk will approximate a normal distribution EFTA01201224 Why tranches? Practically it means that anything at 3-4sigma to the left can be considered AAA and anything at 3-4sigma to the right should be considered Junk In other words, "bond" holders should feel pretty confident about the underlying risk they are buying EFTA01201225 One last note on tranches What explained in the previous two slides is by *no means* guaranteed to be true, but intuitively it should be. Plus, we only need it to be approximately true anyway.. Essentially we need to make sure that investors will not lose their entire investment if one or two companies are indeed breached EFTA01201226 Achtung • The key here is: correlation. If we mess up and stuff is too correlated we'll create another mortgage subprime-like crisis.. Not cool • Also this implies that for each company we should have N bonds not just 1 EFTA01201227 The tech details • When a company is enrolled the CISO and the Board decide which part of their infrastructure they want to "insure" and its value • We enumerate all points of entry to that part of the infrastructure • We assign probability of compromise to each point of entry • The probability of the incident is the probability of the least secure point of entry EFTA01201228 Point of entry evaluation • Analyze the software stack installed • Spawn honeypots that replicate part of the infrastructure and observe their rate of compromise • Use collected data on similar infrastructure to assess the risk • Potentially run Capture the flag-style competitions for exotic infrastructures (a kaggle competition for security roughly) • Rate the set of defenses added on the top of the insured infrastructure based on our internal scoring system EFTA01201229 Motives is also important • We gather data about compromised companies from the internet • We split companies by sector and analyze connections between them • We rate companies based on the industry sector, the connectedness to other companies and regulatory environment EFTA01201230 Technology risks 1 • For highly customized environments you might not be able to replicate the infrastructure on the outside w/o leaking confidential data. In that case you have to do a classic pentest and then rate it (less reliable) • If the data they care to protect is too spread out in the company it might be hard to isolate the entry points. That can be fixed by rating the bond as Junk? EFTA01201231 Technology risks 2 • Especially at the beginning this thing might not scale very well. It will eventually once you have enough data points that you can assess the risk w/o doing any labor intensive work EFTA01201232 "bond" triggers • We select a number of verified partners that can attest if an incident happened • When appropriate we also require the company to disclose the incident • We use our own data and our lawyers to check the company claims EFTA01201233 Fee structure • We earn a % (1-4%) of the coupon companies pay to "bond" holders, plus a fixed (by company size) fee for the initial assessment • We can license our risk model to insurances and reinsurances companies • When the market grows we can also setup an option market for "bond" holders and we collect fees on the trades EFTA01201234 Financial risk • S&P + Deloitte take us over? • SEC shuts us down? • Companies want us to buy the `bond' and then place them? (we don't have enough capital for that) • Companies bypass us and do this on their own with their IB? EFTA01201235 Non-obvious side effects (positive) • We can start publish our rating for security products and eliminate the crappy ones from the market • The market will eventually set the price and the confidence in a company which should put pressure on them to improve their security • Kaggle-like/Capture the flag competitions might do what bug bounties are doing for bugs = give an alternative option for people to monetize their offensive skills EFTA01201236 Non-obvious side effects (negative) • Companies might start to become reckless in the short term (we can probably fix that) • Corporate espionage might raise because of our rating? • If somebody creates a way to short this instrument, people might be incentivized to attack companies and make a profit on the market EFTA01201237 Team • 4 security guys • 2 data analysts • 2 financial analysts • 2 quants/actuaries • 1-2 lawyers (could be a contractor) • 2 sales guys (could be a VAR on the tech side, could be the IB on the financial side) • 2 devs That's roughly $2.9m/year for salary + overhead EFTA01201238 Connections needed • Aon/AIG/insurance/reinsurance • lBs/hedge fund(s) • Incident response company • Law firm EFTA01201239 Open questions • Will CFO/companies go for this? • Will investors go for this? • How to gain trust from both? Is it worth giving our model for free (at first) to insurances & reinsurances to build a brand? • What are the legal requirements for the financial side? • How to get a critical mass of companies to create the tranches? EFTA01201240
ℹ️ Document Details
SHA-256
083299297a997b4f7b2bd214edaa99f7489853bd0e876b2fa7a53cc25bc6db6b
Bates Number
EFTA01201216
Dataset
DataSet-9
Document Type
document
Pages
25

Comments 0

Loading comments…
Link copied!