Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys

被引:0
作者
Woods, Daniel W. [1 ]
Boehme, Rainer [2 ]
Wolff, Josephine [3 ]
Schwarcz, Daniel [4 ]
机构
[1] Univ Edinburgh, Edinburgh, Scotland
[2] Univ Innsbruck, Innsbruck, Austria
[3] Tufts Univ, Medford, MA USA
[4] Univ Minnesota, Minneapolis, MN USA
来源
PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM | 2023年
关键词
ECONOMICS; CHALLENGES; MANAGEMENT; SYSTEMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Incident Response (IR) allows victim firms to detect, contain, and recover from security incidents. It should also help the wider community avoid similar attacks in the future. In pursuit of these goals, technical practitioners are increasingly influenced by stakeholders like cyber insurers and lawyers. This paper explores these impacts via a multi-stage, mixed methods research design that involved 69 expert interviews, data on commercial relationships, and an online validation workshop. The first stage of our study established 11 stylized facts that describe how cyber insurance sends work to a small numbers of IR firms, drives down the fee paid, and appoints lawyers to direct technical investigators. The second stage showed that lawyers when directing incident response often: introduce legalistic contractual and communication steps that slow-down incident response; advise IR practitioners not to write down remediation steps or to produce formal reports; and restrict access to any documents produced.
引用
收藏
页码:2259 / 2273
页数:15
相关论文
共 55 条
  • [1] A case analysis of information systems and security incident responses
    Ahmad, Atif
    Maynard, Sean B.
    Shanks, Graeme
    [J]. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2015, 35 (06) : 717 - 723
  • [2] Incident response teams - Challenges in supporting the organisational security function
    Ahmad, Atif
    Hadgkiss, Justin
    Ruighaver, A. B.
    [J]. COMPUTERS & SECURITY, 2012, 31 (05) : 643 - 652
  • [3] Almulla S, 2014, J DIGIT FORENSICS SE, V9, P7
  • [4] Why information security is hard - An economic perspective
    Anderson, R
    [J]. 17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 358 - 365
  • [5] The economics of information security
    Anderson, Ross
    Moore, Tyler
    [J]. SCIENCE, 2006, 314 (5799) : 610 - 613
  • [6] [Anonymous], 2019, CHI C HUM FACT COMP, DOI DOI 10.1145/3290605.3300424
  • [7] Bana S., 2021, Cybersecurity hiring in response to data breaches
  • [8] Bouwman X, 2022, PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, P1149
  • [9] Bouwman X, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P433
  • [10] THE ECONOMICS OF FIRE PROTECTION: FROM THE GREAT FIRE OF LONDON TO RURAL/METRO
    Carlson, Jennifer Anne
    [J]. ECONOMIC AFFAIRS, 2005, 25 (03) : 39 - 44