Exploring the information content of cyber breach reports and the relationship to internal controls

被引:6
作者
Blakely, Benjamin [1 ]
Kurtenbach, Jim [2 ]
Nowak, Lovila [3 ]
机构
[1] Argonne Natl Lab, Strateg Secur Sci, Ames, IA 50010 USA
[2] Iowa State Univ, Ivy Coll Business, Ames, IA 50010 USA
[3] Argonne Natl Lab, Strateg Secur Sci, Argonne, IL 60439 USA
关键词
COSO; Computer Security; Computer Crime; Risk analysis; Security management; Incident; Breach; RISK; SECURITY;
D O I
10.1016/j.accinf.2022.100568
中图分类号
F [经济];
学科分类号
02 ;
摘要
A number of institutions make reports available regarding the types, impacts, or origins of cybersecurity breaches. The information content of cyber breach reports is examined in light of Principle 15 of the 2017 Committee on Sponsoring Organizations Enterprise Risk Management (COSO ERM) information security control framework to understand the degree to which cyber breach reports reflect the established COSO internal control framework. This study utilizes the COSO ERM internal control framework to examine whether current cyber breach reports contain information that may influence a firm's ability to assess substantial change within its industry due to external forces (COSO ERM Principle 15). As such, this study focuses on data breaches, a special type of cyber incident, which may result in the loss of confidential information. Cyber decision makers rely on this type of information to calibrate information security programs to ensure coverage of relevant threats and the efficient use of available funds. These reports may be used for the purposes of cybersecurity risk assessment and strategic planning. We compare, contrast, and analyzie the reports to identify their utility in such contexts. We also provide an overview of the current cybersecurity reporting environment and suggest revisions to US national cyber policy with the intent of increasing the benefit to reporters and consumers of the data. This study is focused on education as to the current structure of breach reporting based upon our review and synthesis of publicly-available breach reports. In this study, we review nine (9) reports that meet four (4) criteria. We relate these criteria to the framework provided by COSO ERM Principle 15 by analyzing and placing the criteria into a taxonomy developed for this purpose. We analyze the degree to which the reports are comple-mentary, reflect potential improvements of internal controls, and provide recommendations for ways in which these types of reports might be used by practitioners, while highlighting potential limitations. Our findings indicate that the sample reports contain little information that may be incorporated to improve the risk profile of an entity. We provide recommendations to improve the information content and timeliness of breach reports.
引用
收藏
页数:12
相关论文
共 42 条
[1]  
American Psychological Association, 2018, INF REC INCL MAN
[2]  
[Anonymous], 2013, Internal Control - Integrated Framework
[3]  
[Anonymous], 2019, INT SEC THREAT REP
[4]  
[Anonymous], 2013, NIST Special Publication 800-53 R4 Security and Privacy Controls for Federal Information Systems and Organizations, DOI DOI 10.6028/NIST.SP.800-53R4
[5]  
[Anonymous], 2019, Accenture
[6]  
[Anonymous], 2012, Guide for conducting risk assessments, DOI [10.6028/nist.sp.800-30r1, DOI 10.6028/NIST.SP.800-30R1]
[7]   Insurability of Cyber Risk: An Empirical Analysis [J].
Biener, Christian ;
Eling, Martin ;
Wirfs, Jan Hendrik .
GENEVA PAPERS ON RISK AND INSURANCE-ISSUES AND PRACTICE, 2015, 40 (01) :131-158
[8]  
Catlett C., 2008, A Scientific Research and Development Approach to Cyber Security
[9]  
Darrow B., 2017, AMAZON STILL LEADS C
[10]   Hype and heavy tails: A closer look at data breaches [J].
Edwards, Benjamin ;
Hofmeyr, Steven ;
Forrest, Stephanie .
JOURNAL OF CYBERSECURITY, 2016, 2 (01) :3-14