Cybersecurity, by 2025, will no longer be a problem of IT to form part of the foundational element of enterprise risk management and compliance regulation. The broader range and depth of cyberattacks from the whole spectrum of ransomware and phishing to supply chain attacks necessitate that there should be a robust and multi-dimensional protection system. For an attorney, money laundering investigator, and compliance professional, good cybersecurity is inextricably linked with reputation management, risk mitigation, and compliance. This article establishes ethical cybersecurity best practices on an individual, organisational, and insurance level, addressing issues of relevant regulatory frameworks, market drivers, and means of operation implementation.
Personal Cyber Hygiene: First Line of Cyber Defence
Individual cyber hygiene is a sufficient but not a remembrance-based defence. Most of the cyber attacks were due to user password compromise, phishing, or hardware vulnerability. While avoiding such vulnerabilities, individuals must have good security practices. Individuals must have good security practices.
All credentials need to be secured with good one-time passwords. Encrypted password managers utilising encryption algorithms (e.g., AES-256) not only secure data, but also are capable of generating credentials in a secure way. Multi-factor authentication (MFA) provides an added security by utilising one-time codes or biometric/fingerprint authentication. MFA will prevent over 99% of automated bot attacks, asserts the U.S. Cybersecurity and Infrastructure Security Agency (CISA, 2023).
Hardware and software should also be upgraded. Upgrading the software and hardware with current security patches reduces exposure to already known attacks. Use of VPN by the users needs to be used for encrypting the data transfer if a public internet access connection is being used. Sensitivity to phishing is the final precaution. Supplying the user with frequent simulation and training in phishing can help reduce the frequency of social engineering attacks.
Regulatory bodies such as the European Union (Article 32 of GDPR) and US health care agencies (HIPAA Security Rule, 45 CFR ยง164.308) mandate organisations to put and maintain such controls of personal security before use by users handling sensitive or safeguarded information.
Enterprise-Level Cybersecurity: Institutionalising Resilience
Cybersecurity, from a governance standpoint, is a technical as well as a fiduciary concern. Organisations must develop risk-based policy-driven cybersecurity controls that are auditable and harmonisable against international standards such as the NIST Cybersecurity Framework (NIST, 2018) and ISO/IEC 27001.
Good government begins with a model of governance of shared governance where control is shared in the discovery, avoidance, learning, responding to, and recovering from cyber attacks. Management will be required to balance IT, compliance, risk, and legal ability. Policy should establish accountability, transparency, an escalation process, and control testing.
Technically, organisations should employ solid firewalls, intrusion prevention, and network segmentation to limit over-access and lateral mobility. Artificial intelligence-based Endpoint Detection and Response (EDR) solutions possess stronger monitoring powers to identify unusual activity in real time.
Data protection is of utmost importance from a regulatory point of view. All operationally sensitive, financial, and personally identifiable information must be encrypted in storage and transit. It is not just best practice but is mandated by data protection acts like GDPR, DPDP Act of India, and the U.S. Gramm-Leach-Bliley Act. Role-Based Access Control (RBAC) and least privilege need to be enforced to limit access by insiders.
Incident detection and response procedures have to be done either by a Security Operations Centre (SOC) or outsourced to a Managed Security Service Provider. Incident response procedures should follow the NIST SP 800-61r2 standard, that is, containment, eradication, recovery, and post-incident review procedures. Red-team exercises and tabletop exercises for conducting these procedures are now even more of a regulatory requirement in sectors like banking and energy.
Supplier and supply chain security is a very up-close-and-personal lead exposure issue these days. Firms need to exercise robust third-party due diligence, ensure that they have cyber security accreditations (e.g., SOC 2, ISO 27001), and breach notice and incident response controls in contracts. The 2023 MOVEit data breach highlighted the titanic list of third-party software vulnerabilities (CISA, 2023).
Cyber Insurance: A Strategic Risk Transfer Tool
Where technical controls are the initial line of defence, organisations increasingly today rely on cyber insurance as a risk transfer mechanism, and that is also monetary. Cyber insurance includes coverage for incident response expenses, data recovery, business interruption, regulatory fines, and third-party liability in most policies. Conditions of cover are extremely varied between insurers, though.
Insurers also require evidence of the maturity of an applicant in cyberspace before cover, typically requiring evidence of patching, endpoint security, and employee training programs. Organisations that do not have such a minimum level of protection risk will have their cover declined or be quoted surcharged premiums. Insurers even exclude nation-state attack, insider attack, or unpatched system attack cover, leaving it to the organisation to be operationally aware.
Regulatorily, cyber insurance may be used to pay for good response and penalty fees, but in any form at all as an alternative to regulation. Under GDPR, for instance, organisations are expected to notify supervisory authorities of certain breaches within 72 hours and yet may still be fined even if they hold cyber insurance. Compliance lawyers and lawyers should thus examine cyber insurance policies, beware of several well-known exclusions, and also make sure coverage is incident response plan-friendly.
Regulatory Expectations and Trends
Cybersecurity continues to be under the global regulatory spotlight. The European Union's Network and Information Security 2 Directive (NIS2), the Digital Personal Data Protection Act (DPDPA) of India, and the United States Securities and Exchange Commission (SEC)'s new cyber disclosure rules are all harbingers of an increasing global trend of minima and disclosure.
Regulated institutions such as banking, insurance, healthcare, and essential infrastructure will have to undertake stronger cyber resilience testing. Such may include red teaming, penetration testing, and scenario-based crisis simulation. Organisations will have to be required by regulators to demonstrate not only technical competence but also governance maturity and board-level cyber risk management.
Technology adoption is also rising. AI-based anomaly detection technologies, security orchestration and automated response (SOAR), and behaviour analytics are now the norm. But all these have to be deployed after adhering to privacy legislations and with in-house controls so that they cannot be manipulated.
Compliance and lawyers must stay abreast of the changing threat environment. Stay current with regulatory developments, emerging technology, and the way threats change to be operationally and legally compliant.
A Multi-Layered Approach to Cybersecurity Governance
It is the era of networked infrastructure, technology-enabled threats, and regulatory diktat, and cybersecurity has to be addressed as a multi-dimensional, enterprise-centric body of knowledge. Good insurance practice, good business practice, and good personal hygiene practice all have a role to play in the management of cyber risk. For compliance practitioners, advisers, and anti-money laundering specialists, incorporating cyber security into enterprise risk governance can no longer be an option but a necessity.
Cybersecurity is not a point-in-time success or accomplishment that's checked off, but a continuous effort requiring industry, flexibility, and cooperation across functions. Meeting a recognition of the confluence of best practice, operational need, and regulatory expectation, organisations can create their security reputation, safeguard stakeholders, and provide business continuity in a dynamic, hostile internet environment.
What's Your Reaction?
CRCGS