Over six years later approaching 2017, Operational Risk Management (ORM) professionals are experiencing the "New Normal." In a 2010 CSO Magazine sponsored eCrime Digital Watch Report
and survey of 535 companies there are some observations on Operational
Risk Management worth examination.
This CERT report the same year was focused on the "Insider Threat" and the area of concern is still on "Digital Incidents by Insiders." Seven years later, these numbers have only increased:
- Past 12 months the number of incidents reported increased 16%
- The per incident monetary loss (mean) was $394,700.00
Yet
these two items are just the trend these days as our global work place
becomes more mobile and stratified using more partners, offshore
suppliers and other 3rd parties to accomplish the daily tasks and
workloads. What is even more alarming are the following stats from the
survey:
- 72% of the incidents were handled internally without any legal action or law enforcement.
- 29% of these incidents could not identify a subject responsible for committing a crime.
- 35% of these incidents could not proceed due to a lack of evidence.
Interpreting these numbers prompts several questions worth discovering. First, why were 28% of the incidents handled with some form of legal action or law enforcement?
One of two reasons that we can surmise. The incident was exposed to
the public as a result of the magnitude or harm that was caused by the
incident. The organization was prepared to capture evidence, properly
investigate the incident and pursue a recovery of the loss either in a
civil or criminal process of law.
Second, why were 35% of the incidents unable to proceed due to a lack of evidence?
The organization may be lazy or apathetic to these loss events or may
have an insurance policy that covers these types of losses and was able
to successfully recover the almost $400,000.00 incident average through
this process.
Or, the organization is not capable of
leveraging a sound "Digital Governance" and "Legal Policy" framework in
order to properly investigate incidents that come from their own
internal work place ecosystem of employees, partners, suppliers and
other 3rd parties.
In order to gain "Strategic Insight"
into these vital Operational Risk matters within the enterprise the
organization must establish an intelligence-led investigation. Once the
proper evidence collection and analysis is completed on the incident
then members of a corporate crisis team or threat management council can
make more informed decisions. That brings us to the final question. Why in 71% of the incidents was a subject not identified as being responsible?
The answer to this question has much to do with the previous one where there was a lack of evidence. However, our hunch is that many of these insider incidents were the result of an employee error, mistake or unintended consequences. The lost or stolen laptop from the unlocked car may fill some of this category.
Why would it be in the best legal interest of an organization to have a robust evidence collection capability supported by a sound "Policy Governance and "Legal Framework"?
- Duty of Care
- Duty to Warn
- Duty to Act
- Duty to Supervise
This
blog has touched upon these four vital areas of vulnerability to
adversarial litigation in the past because we know that whether you ask
these questions internally or the state's Attorney General and the FBI
ask these questions the answers must be discovered:
- What did you know?
- When did you know it?
- What are you doing about it?
While
the number of loss events due to errors or omissions and many times due
to a lack of proper training and awareness programs is growing, so are
the incidents as a result of the insider threat from:
- Fraud
- Sabotage
- Espionage
- Trade Secrets Theft
The
modern day enterprise with preemptive, robust and collaborative law
enforcement mechanisms in place has accepted the reality of the threat
perspectives in their workplace ecosystem:
- Some individuals who make threats ultimately pose threats.
- Many individuals who make threats do not pose threats.
- Some individuals who pose threats never make threats.
Make
sure you read those a few times. As a result of the reality that the
workplace ecosystem is an evolving, dynamic and rapidly changing set of
human elements, behaviors and motivations the justification for creating
more "Strategic Insight" is a necessary mitigation strategy. There is a
growing trend today for these enlightened organizations to create and
effectively provide the resources for a corporate threat management
team. This team is comprised of a spectrum of members that span the
digital to physical domains within the company. This includes the Chief
Risk Officer, General Counsel, Internal Audit, Public Relations, Human
Resources, Corporate Security and Information Technology.
In another less formal survey by Dr. Larry Barton
of 630 employers the question was raised on the employee communication
channel that caused the company to act on a risk. 38% were through a
digital messaging medium such as e-mail, text messages and blogs or
social networking sites. The ability to monitor over one third of
employee communication channels remains a daunting task to this day.
Beyond
the utilization of threat assessment or management teams, enterprises
are going to the next level in creating a "Corporate Intelligence Unit"
(CIU). The
CIU is providing the "Strategic Insight" framework and assisting the
organization in "Achieving a Defensible Standard of Care."
The
framework elements that encompass policy, legal, privacy, governance,
litigation, security, incidents and safety surround the CIU with
effective processes and procedures that provides a push / pull of
information flow. Application of the correct tools, software systems
and controls adds to the overall milestone of what many corporate risk
managers already understand.
The best way in most cases
to defend against an insider attack and prevent an insider incident is
to continuously help identify the source of the incident, the person(s)
responsible and to correlate information on other peers that may have
been impacted by the same incident or modus operandi of the subject.
"Connecting The Dots" with others in the same company or with industry
sector partners increases the overall resilience factor and hardens the
vulnerabilities that are all too often being exploited for months if not
years.
In retrospect, you can be more effective
investigating and collecting evidence in your company to gain a
"DecisionAdvantage". To pursue civil or criminal recovery of losses
from these insider incidents, you may not go to law enforcement, but
it's likely they will come to you once they get a whistle blower report,
catch the attacker and/or they have the evidence that you were a
victim.
What side of the incident spectrum you are on,
either proactive or reactive could mean the difference on whether the
attackers continue their schemes and attacks while continuously
targeting those with the greatest vulnerabilities. In some cases, those
attackers include the plaintiff bar and your evidence of "Duty of Care"
is the bulls eye.
No comments:
Post a Comment