The concept of topography, specifically related to cyber attack spaces, has been rattling in my head for the past few months. What are the shapes of current cyber attack spaces? What are the shapes of future cyber attack spaces? What might a person include as categories (and elements of the categories) of cyber attack spaces… Continue reading Potential Categories of a Cyber Attack Space Topography
Category: Cyber Risk
Regarding Cyber Risk Funding- 2
I'm hypothesizing that when insurers and insurance groups fund startup cyber MGAs or startup cyber insurers they are behaving like VCs hoping to generate desired returns from (some of) their investments. But are they really behaving like VCs - do these insurers (using cyber MGAs) have a plan regarding how much to invest, or a… Continue reading Regarding Cyber Risk Funding- 2
Past Experience Insuring Risks Won’t Help Insure Risks Of Our Emerging Cyber-Forming World
My wife is from Kansas City, Missouri. Some of you (most of you?) might know that Missouri is the "Show Me" State (they have to see something to believe it). Throughout almost the entirety of my insurance career after I left working for marketing departments in a few insurers (across all major lines of business… Continue reading Past Experience Insuring Risks Won’t Help Insure Risks Of Our Emerging Cyber-Forming World
A Proposed Enterprise Cyber Risk Profile Framework [First Cut]
Does your enterprise have a cyber risk profile? Is it continually updated? Is is 'a real-time profile?" (Does your enterprise know what a cyber risk profile is or why it might be necessary?) If yes to any of those questions, do you believe your enterprise cyber risk profile encompasses every, or at least most, of… Continue reading A Proposed Enterprise Cyber Risk Profile Framework [First Cut]
Cyber Predictions: You Don’t Know…
I believe that there are many unknowns in the Cyber Age. You can flash back to the 2X2 of "known-knowns", "known-unknowns", "unknown-knowns" and "unknown-unknowns" but I want to keep it somewhat straightforward. That's why I show the illustrative visualization below. It's my attempt of showing a relatively straight-forward visualization, a 2-dimensional visualization at that, of… Continue reading Cyber Predictions: You Don’t Know…
Cyber Attack Space Elements (Selective)
This blog post is just a "thinking out loud and writing it down" blog post about cyber attack space(s). Here are some of the elements of the cyber attack space: Enterprise IT-created / enabled business / system processes (or certain activities of those processes) are connected to the web; Mobile devices become "smart" and, as… Continue reading Cyber Attack Space Elements (Selective)
Possible Cyber Risk Financing Stack (For Large / Jumbo) & Mid-Size ?? Enterprises
The visual below is an illustrative cyber risk financing stack for Large / Jumbo enterprises. And maybe Mid-Size enterprises as well ??? For me, this stack visualizes a possible end-game for (re)insurers now selling cyber insurance. It reflects my point-of-view that (re)insurers should not be selling cyber insurance at all. Each segment of the stack… Continue reading Possible Cyber Risk Financing Stack (For Large / Jumbo) & Mid-Size ?? Enterprises
Risk Landscapes: Traditional & Cyber-Focused
During my insurance industry years (industry itself, management consulting, insurance industry analyst), there were illustrations of the risk landscape of risk events to consumers and/or enterprises at that point-in-time. Often, the risk landscape included attempts at frequency and severity of each risk. "Traditional" Risk Landscape For me, the 'traditional' risk landscapes encompasses risks, some of… Continue reading Risk Landscapes: Traditional & Cyber-Focused
The Luxury of Being Cyber Secure Does Not Exist (Now or Ever) in the Digital World of Commerce
Someone on LinkedIn said that enterprises can become more cyber secure if they identify, choose, and ensure the firms they choose to conduct commerce have “value” and are cyber secure. (That statement triggered this blog post.) However, even systems we believe have value will themselves connect to other systems (which we may or may not… Continue reading The Luxury of Being Cyber Secure Does Not Exist (Now or Ever) in the Digital World of Commerce
Cyber Metric: The Density of Interdependence of Cyber Attack Spaces (First Cut)
In this post I discuss my: Description of cyber attack spaces; Thought process to get to the metric: 'Density of Interdependence' of cyber attack spaces; List of my working hypotheses as some bit of context; Choice of a visual to use the 'Density of Interdependence' metric; Marked up visual to support thinking about the metric;… Continue reading Cyber Metric: The Density of Interdependence of Cyber Attack Spaces (First Cut)



