Cyber Attacks: How to Rapidly Detect, Respond and Contain Damage

Cyber Attacks: How to Rapidly Detect, Respond and Contain Damage
Cyber Labs

11 of 11

This insight is part 11 of 11 in this Collection.

March 9, 2023 10 mins

Cyber Attacks: How to Rapidly Detect, Respond and Contain Damage

Cyber Attacks: How to Rapidly Detect, Respond and Contain Damage Hero Image

How can firms stay on top of cyber threats in an increasingly digitalized world?

Key Takeaways
  1. Cyber attack is one of the top five risks business leaders focus on most.
  2. Embracing risk is the only option, with prepared business leaders continuing to make long-term investments in long-tail risks.
  3. Business leaders are embracing counsel from both internal and external sources to mitigate cyber risk.

In the face of rising inflation and an ongoing energy crisis, leaders still recognize cyber attacks as one of the top five threats to their business. According to Aon’s Executive Risk Survey 2022, 40 percent of business leaders are focusing their efforts on managing cyber risk. Despite the urgent challenges this brings to the table, leaders are not pulling back on cyber preparedness.

Emerging Cyber Security Threats

As many as 83 percent of organizations have experienced more than one data breach in their lifetime1, averaging upwards of US $4 million in damages. Even sophisticated security measures are falling short and quickly becoming obsolete as attackers continue to adapt and evolve. Once a breach occurs, it can often remain undetected for long periods, taking an average of nine months2 and causing significant damage in the meantime.

Threat #1: Social engineering attacks

Phishing, compromised business emails, third-party software vulnerabilities, and stolen or compromised credentials were the costliest cyber threats for businesses in 2022, totaling about US $20 billion and resulting in business interruption losses, infrastructure destabilization, private data leaks, theft of proprietary information, loss of reputation, and much more.

Threat #2: Evolving work models

Forbes3 estimates that by 2025, 70 percent of the workforce will be working at least five days a month remotely. Such rapid digital evolution of business models across all industries has made cyber risk a persistent threat to the ‘new normal.

Threat #3: Interconnected risks across business ecosystems

Businesses are now exposed to rising interconnected risks not just from within an organization’s own network but also countless vulnerabilities in a complex ecosystem of physical and digital vendors, partners, supply chains, and even open-source code.

How to Embrace Risk and Build Cyber Resilience

Top business leaders know that now is not the time to slash cyber security budgets, with 69 percent of organizations planning to increase their cyber security spending.4 For 90 percent of well-prepared leaders, the current economic climate has increased their appetite for addressing risk.

Because vulnerabilities exist inside and outside an organization, fully addressing cyber risk requires an enterprise-wide, cross-functional approach that extends beyond its network perimeter. In addition to the Chief Information Officer and Chief Information Security Officer, cyber security should be the responsibility of executive-level and departmental leaders.

A strategic and integrated approach involves pre-defined roles and cross-functional communication across the organization, with the aim of building organizational resilience as opposed to preventing incidents. Strategies should encompass the following:

Cyber security and phishing training for all employees

Create a cyber secure culture where enterprise security is the responsibility of all technology users, and train employees to spot and report suspicious incidents.

Multifactor authentication and limited access controls

Add additional requirements to the login process to limit the damage of stolen credentials, segment the network to reduce the spread of malware, and limit access privileges.

IT security controls, software patching, detection tools

Ensure all systems are up-to-date, vulnerabilities are patched, and detection tools and alerts are properly configured, and log all activity.

Involving incident response and functional experts

Hire professional cyber threat hunters trained to anticipate situation-specific threats and pre-arrange digital forensic experts, legal counsel, crisis communicators, and ransom negotiators.

Threat hunting, threat intelligence, and supply chain due diligence

Systematically hunt generic and targeted threats within the network, test third-party software, and monitor the deep and dark webs for threats and leaked assets.

Vulnerability testing and attack simulations

Stage simulated attacks using real-world breach techniques to evaluate the organization’s ability to prevent, detect, and respond to threats and use metrics to inform cyber security strategies and budgets.

Business continuity, disaster recovery planning, and third-party risk management

Regularly review and update incident response playbooks, business continuity plans, and disaster recovery plans, test response through realistic simulations, enforce third-party risk assessments and hold post-incident reviews.

Cyber Attacks: How to Rapidly Detect, Respond and Contain Damage Image Divider


increase in supply chain attacks in 2020

Source: Office of the Hong Kong Government Chief Information Officer

Cyber Resilience Strategy Must Work Hand-in-Hand With Risk Transfer and External Counsel

Even the best precautions can fail to keep attackers permanently at bay. Traditionally considered to have secure and protected systems, the financial sector has been particularly prone to cyber attacks in 2022, as in outages in New Zealand for ANZ bank5 and attacks on the Japanese cryptocurrency exchange, Liquid.6 Globally, there were various high-profile incidents of bank theft using the SWIFT electronic payment messaging network. The Sunburst hack of 2020 also shows how a backdoor supply-chain attack compromised organizations with best-in-class cyber security practices. These included key US government agencies, Microsoft, Intel, cyber security firm FireEye, and more.

Because cyber attacks can never be fully circumvented, no cyber resilience strategy is complete without risk transfer. This involves assessing and quantifying the organization’s cyber risk exposure and tolerance and incorporating these into a long-term strategy. Appropriate cyber insurance coverage can then be obtained for areas such as indemnification for loss, liability, regulatory omissions, physical damage and more. This approach also reinforces the corporate risk management mindset and influences cyber security controls and best practices across the organization.

Another key differentiator in leaders’ quest for sustained cyber resilience is a willingness to engage a good external advisor or consultant to help make better decisions and address risk. Resisting the impulse to delay capital investment in response to short-term risks, well-prepared leaders are open to bringing in consultants to help strengthen an organization’s response to real-world threats.

Mitigating Cyber Risk
  1. Build a cyber resilience strategy
  2. Ensure appropriate cyber insurance coverage
  3. Partner with external advisors and consultants

Today’s business risks are interconnected, challenging leaders to respond to emerging threats with agility. Organizations can only head into uncertainty with confidence by addressing top risks such as cyber security.

For more information on cyber risks, download our 2022 Executive Risk Survey.

General Disclaimer

The information contained herein and the statements expressed are of a general nature and are not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information and use sources we consider reliable, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation.

Terms of Use

The contents herein may not be reproduced, reused, reprinted or redistributed without the expressed written consent of Aon, unless otherwise authorized by Aon. To use information contained herein, please write to our team.

More Like This

View All
Subscribe CTA Banner