Moody's Talks - Inside Economics - The Macroeconomics of Cyber Attacks

Episode Date: May 27, 2022

Jim Hempstead, Lesley Ritter, and Leroy Terrelonge from Moody's Investors Service, Join the podcast to discuss the rising concern of cyber risks and attacks.Full episode transcriptFollow Mark Zandi @M...arkZandi, Ryan Sweet @RealTime_Econ and Cris deRitis on LinkedIn for additional insight.  Questions or Comments, please email us at helpeconomy@moodys.com. We would love to hear from you.  To stay informed and follow the insights of Moody's Analytics economists, visit Economic View. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Transcript
Discussion (0)
Starting point is 00:00:13 Welcome to Inside Economics. I'm Mark Zandi, the chief economist of Moody's Analytics. And today, it's a special podcast. We're going to be talking about the threat posed by cyber risk and the macroeconomy. And of course, I'm joined by my two co-hosts, Ryan Sweet, the director of real-time economics, and Chris Duretys. Chris is the deputy chief economist. And we're also joined by three of our colleagues from the rating agencies, Moody's investor service. And so this is a special podcast. It's the first podcast, I think, where we've had both folks
Starting point is 00:00:48 from Moody's Analytics and MIS together. And because of that, it's important to recognize that the folks from MIS may have different views than those from Moody's analytics. That's us. And the views expressed by, I guess, from one company or division within the Moody's family can't be attributed or shouldn't be attributed to other companies or divisions. It's also, I think, important for me to say that, you know, by listening to this podcast that you're downloading it, you are agreeing to Moody's legal terms and conditions that's found at moody's.com slash disclaimer, including any information provides not information or financial advice, and that Moody's will not be liable for losses arising from your use of the information.
Starting point is 00:01:31 I mean, clearly, this is a language that's necessary in the context of this podcast where we're going to have folks from both the MIS and Moody's analytics. And I do think this highlights one of the very special things about the Moody's Corporation that just shows the very talented group of folks that we have there. So with that, let me bring in our guests from MIS and begin with Jim Hempstead. Jim, can you tell us a little bit about how you landed where you are today? Sure, thanks a lot. And by the way, I'm a huge fan of your weekly podcast.
Starting point is 00:02:04 I very much enjoy watching the three of you. And I agree, great talent on that podcast. that you do every week. But I manage the North American. Well, Jim, Jim, this is really important. Jim, Jim, this is important. Which of the three do you like the most? That's the key question.
Starting point is 00:02:23 I'll let you know at the end of the statistics game. Oh, wow. Very good, very good. Okay. But Mark, I'm part of the project and infrastructure finance team here at Moody's. We, on a global basis rate a little over $3 trillion of debt in the electric utility, gas, midstream, water and wastewater sectors. And we have a lot of municipal and other infrastructure sectors like airports, seaports, and toll roads. I manage the
Starting point is 00:02:53 North American portfolio. And I also manage a small team. And we've got Leslie Ritter and Leroy-Tarra along with us, a cyber group inside the rating agency. So our job is not to manage Moody's corporation cybersecurity, but what we are trying to do is raise the knowledge and the awareness of our 1,300 global credit analysts so that when a cyber event affects one of the rated entities that we work with, we could respond more authoritatively and have better engagement with the marketplace by doing that. And this all really came about back in 2015, I would say, when the utility industry was doing a lot of introspection on their cybersecurity capabilities. And I started to have a conversation with our chief information security officer for Moody's Corporation as a way of starting to learn more about it.
Starting point is 00:03:49 And we've really grown over the last bunch of years as a result of that. Did you say how many years have you been with the Moody's, Jim? I've been at Moody's since 2002. 2002. Well, about 20 years now. And prior to that, I was in the investment banking sector. I started out at the terms. I did a run through Smith Barney, Solomon Smith Barney,
Starting point is 00:04:10 and then also Merrill Lynch for the first 12 years. All in the infrastructure sector. Got it. And Leslie Ritter also is joining us from MIS, the rating agency. It's good to have you, Leslie. Hi. Thanks for having me. Yeah, so I'm Leslie Ritter.
Starting point is 00:04:27 I've been with the firm for 10 years now, almost 10 years, and working for Jim for almost 10 years. So I started out really as a credit analyst in the electric utility and natural gas pipeline space. Prior to that, I was doing work at GE Energy Financial Services. So we underwrote different power deals all around the world. And at that time, we never talked about cyber. But since joining the team with Jim, we started a discussion, like he said in 2015, thinking about cyber and how it would impact our companies.
Starting point is 00:05:00 and we realized that we really hadn't thought that through so much, and we wanted to know more. And over time, we built our team and created our own cyber team in 2019. And I've been there since. So it's been really fascinating and I'm really thrilled to be here today. Oh, so you've been working with Jim for 10 years. I know. Hence all the gray hair.
Starting point is 00:05:26 Good for you. Good for you. Good for you. Good. Hey, and we also have a Leroy, Teralong. Good, good to have you, Leroy. Yeah, thanks, Mark. So I'm, I guess, the junior member of the team or one of the junior members of the team.
Starting point is 00:05:40 I've only been at Moody's for three years since 2019 when the cyber risk group sort of had its formal inception. And my background is I started working as a language analyst for the national security agency. And then ended up sort of falling into cybersecurity and really becoming very interesting. in sort of the links with financial performance. I did a master of international business degree. And then when the opportunity at Moody's opened up, I was like, wow. I mean, how many opportunities are there to have cyber expertise and then also, you know, marry that with financial performance.
Starting point is 00:06:18 And so, yeah, I've loved the past three years that I've been here. You said you were a language, what? A language analyst. Analyst for the NSA? That's correct. Yeah, I speak Persian-Farsi. No way. Really?
Starting point is 00:06:31 Oh. Yeah. You know, I'm, I'm, uh, Zandis is a Persian name. Yeah, of course, you knew that. You didn't know that. I knew it. Oh, you guessed it. Oh, okay.
Starting point is 00:06:40 Yeah. My, you know what? It's, I'm, um, disappointed to say, but I don't know Farsi. You know, when my dad came over from Iran, he was a student. And at that time, the philosophy was that you needed to be an American. You had to speak English. You cannot, you should not speak the language from where, wherever you came. So I don't, unfortunately, know Farsi.
Starting point is 00:07:03 Such a beautiful language. Absolutely. And difficult, right? That's a very hard language to learn. I believe. It's, I mean, I think the difficulty comes to the writing. Learning the writing is probably the hardest part. But speaking, like you said, it's very beautiful.
Starting point is 00:07:19 And it has a lot of traits that it shares with other Indo-European languages like English. So it's not so hard on the speaking front. Do you know any poems? Because my dad, all he does all day long is, recite poems in Farsi. I do, but I don't know if I can recite any brief here. Commigranes and recite poetry.
Starting point is 00:07:40 Yeah. Yeah. Do you know any poems? Not at the top of my head. Okay. I do really like Iranian poetry, but you put me on the spot here. No, no, no, no. Iranian food, right? I mean, oh my gosh.
Starting point is 00:07:56 Yeah, every year, a new tradition for my family. We're not, we don't have any, you know, birth links to Iran. But my husband and I, we have an annual Norus, Persian New Year party. And yeah, we eat lots of great Iranian food. Okay. Well, it's so good to have you. It's really a pleasure to have all of you. And thank you for spending some time with us. So, again, the purpose of the conversation is to get a better grip on cyber risk. Of course, we're macrocom. So we're really curious if there's a lot of any nexus between cyber and the macro economy, but obviously there's a lot of in-between
Starting point is 00:08:36 between companies and governments and everything else, individuals, everything that's going on. So maybe we should just level set and talk about what is cyber risk? You know, what are some examples of the threats posed by by cyber? Leroy, you want to kind of lead us down that path a little bit? Sure, yeah, it's good to have an idea of what a cyber attack is because you hear about that all the time. in the news and may not be clear for listeners what they should expect when they hear about cyber attacks. So basically, a cyber attack is anything that impacts what we call this CIA triad. It's not the Central Intelligence Agency. It's not the Culinary Institute of America. It's
Starting point is 00:09:20 confidentiality, integrity, and availability. What that means is confidentiality, think data that people shouldn't have access to or at least unauthorized access to. You want to keep that data secrets. So a data breach like the cyber attack against Equifax in 2017, that would be an example of something that's affecting confidentiality. On the integrity front, this is you want to make sure that the data that you have is accurate. It hasn't been changed or manipulated. And so one example of an attack against integrity was in 2014,
Starting point is 00:09:52 attackers were able to change the election results for the Ukrainian election. And they figure that out 40 minutes before they were supposed to announce the election results. Yeah. So they caught it in time. They were able to fix that. But that's an example of an attack against integrity. And then lastly, is availability. And that's making sure that you are able to access the information you have in a timely matter.
Starting point is 00:10:19 So ransomware has been a lot in the news recently. That's when people lock up your data, say that you have to pay a ransom to get access to it. That's an attack against the availability of your data. Is ransomware the most prevalent form of cyber risk at this point? It feels like that's what's mostly in the news. Is that top of mind for most businesses when they try to protect themselves against cyber? It's definitely having a moment, right? Like I feel like cyber attacks, different types of cyber attacks have shelf lives.
Starting point is 00:10:56 And right now we're in sort of the cycle for ransomware. It's very profitable. And because of the business disruption, a lot of organizations want to pay. So until we see some sort of movement on deterring ransomware attacks, we think it's have, you know, a long shelf life is going to have a lot more impact. Right, right. I guess I've, go ahead, Leslie. I was just going to add just because when I got into cyber, I always thought of availability
Starting point is 00:11:30 of data as being, you know, like customer information, but availability, availability of data is a lot more because if you think about it, different types of manufacturers operate on digitally enabled machines that operate off of it. of data, right? So you could disrupt a machine through some kind of ransomware attack, and that's affecting the availability of data, too. So I just want to make sure your listeners understand that we're not only talking about, you know, customer information, but data is everywhere. Yeah, it makes a lot of sense. What about denial of service? That also is, that seemed to be more popular a few years or the popular form of cyber risk a few years ago.
Starting point is 00:12:12 Is that right? Do I have that right? That's right. Yeah, especially in the early, 2000s or 2010s, I should say, people might be familiar with an ominous, the group that had like the, yeah, they had the weird videos, the voice, you know, We Are Legion, blah, blah, et cetera. The industry really didn't have a good handle on denial of service attacks, which is when you send so much web traffic to a server that it can't handle the legitimate traffic so people can't get to websites. But since then, there have been leaps and bounds in protecting websites from those sorts of attacks. And so you don't really hear about DDoS attacks as much. They happen, but they're not as impactful as they were in the early 2010s.
Starting point is 00:13:02 Right. And what about fishing? That's the other, at one point was popular. So it's still an issue, the fishing where people kind of send you an email or text or something and entice you to click on it and then they've got you. They've infected you. in your machine. Yeah, fishing is a perennial risk that we see. I mean, you know, at Moody's at any organization, basically, you're working at. You're probably seeing these fishing tests where they send you a message and then if you click on it, then you get something saying, oh, you fell for this fishing test. You might have to go do some extra. It happens to write all the time, Leroy. Yeah. Happens them all the time. He's batting perfect for that. I always didn't fear of those because,
Starting point is 00:13:45 you know, imagine five fall for one of those, and I'm on the cyber risk, right? Like, you must be sweating all day long. I'd be so embarrassed. Just don't check your email. That's a, that's the response. Yeah, that's the right answer. You know, are we pretty good at people getting better at, they must be getting better?
Starting point is 00:14:04 You know, one thing I've always wondered, is it the same people that always fall for the fishing, you know, efforts? I mean, some people just can't resist. Is that, is that, that's kind of sort of in my mind. Is that true? Is that what happens? To a certain extent, yes. I mean, yeah, organizations never want to fire somebody because they've fallen victim to a fishing attack, right?
Starting point is 00:14:30 It's to raise awareness, is to make sure people know that these sorts of threats are out there. But there have been instances where folks have so egregiously just clicked wantonly on, you know, all these things coming in. Yeah. It does, some companies have made the decision that at some point it has to affect your performance evaluations. Yeah, I'm so, you know, I'm so paranoid now that if I see anything that I don't know exactly what it is, I send it to my IT guy and say, should I click on this? And I'm thinking it would be nice for the company to have someone like that where I could just say, hey, should I click on this and get an answer back, you know? You're not aware of the button on Outlook that says fishing? you hit that.
Starting point is 00:15:14 Is that what that's for? I'm supposed to put it over there. Oh, I just send it to Gershman. Well, now Gershman's not with us anymore, but to Sal, you know, and say, hey, Sal, should I click on this? I'm sure. I'm sure. I love getting those emails. It's the fishing clicking that is one of the most frequent methods for people who shouldn't be in the system to get into the system.
Starting point is 00:15:40 And that's why companies test so much for it. And you do have a handful of employees that always fail the test. Yeah. When they fail the test three or four or five times, that's where you have to try to decide how to remedy that situation. Okay. Any other new things coming down to pike here that you want to call out in terms of new cyber risk? I mean, all these things we talked about ransomware fishing, denial of service, they're all pretty, we've pretty, a pretty, a pretty, get grip on those, we understand, understand what they are. Are there some things out there that we
Starting point is 00:16:14 just are so new that just kind of coming on the scene that we should be aware of? I think maybe the one that you didn't mention is data breaches. Okay. That's not new, but what's happening is the attackers are merging two different types of attacks, so ransomware and data breaches together. So they would go after you and hold you ransom and say, if you don't pay us, we will disclose all your information to the public. So it's kind of a, you know, a new tool. Well, not so new anymore. It's been what they were two years that they've been doing this, but that's been a more potent type of attack that's come up on that end. And I think I'd add really quickly, too, that I think in the cyber security field, we're always sort of interested, what's the new,
Starting point is 00:16:58 what's the newest thing, what's the newest type of attack? But, you know, most of the attacks are pretty much been the same for a long time. They are able to use the same techniques to achieve the same end. And just like, you know, anybody else, cyber criminals are often lazy. They want to get the biggest bang for their buck by doing the easiest thing. So, you know, we want organizations, or organizations are often like, hey, you know, what's the newest, sexiest new attack? But really focusing on the tried and true methods and basic cyber hygiene practices is really where they're going to protect themselves the most. Yeah. I think maybe what's new. And not. So much in terms of types of attack, but who they're going after.
Starting point is 00:17:43 They're finding ways of attacking maybe higher profile companies or companies in spaces that they didn't use to go after. So like industrial companies and energy companies. Before it was very retail focused, banking focused. And now they're finding ways of going after different industries, which might require more sophisticated skill set because you have to go into these kind of physical operations in order to tamper with them and cause problems. I just say I like to use the phrase, you know,
Starting point is 00:18:17 cyber risk is not as bad as you think it is, but it's worse than you know. And to Leslie's point, the interconnection between the information systems, the IT systems, the information technology systems, and the operations of these industrials and widget makers is something that I think we'll see a lot more focus on going forward because you can use the IT systems to disrupt the operations. I'm thinking about temperature and flow and pressure and things of that nature that actually makes the widgets. You can disrupt them through a cyber incident through the IT system.
Starting point is 00:19:01 And the colonial gas pipeline story, which were about the one year anniversary of that, is a great example of that. Right, right. Hey, maybe we should move on. That was a very good assessment of all the different ways cyber is affecting us. And talk a little bit about the costs. You know, Jim, you and I have been kind of having this conversation about having this cyber risk conversation in the podcast for quite some time. And I was always struggling to figure out, well, does this risk risk,
Starting point is 00:19:36 rise to a level that it becomes a broader macroeconomic problem. And can you give us some context here? How big a deal is this in the grand scheme of things in terms of the cost? So the costs associated with a cyber event can be defined and measured in many different ways and the cost range. So I think this morning we were emailing about the almost trillion dollars worth of global costs that you cited. There's another number that's been cited of $6 trillion. It's sort of the third largest economy, if you include that. When we think of costs to a company, we call them issuers in
Starting point is 00:20:22 the rating agency because anybody can issue debt. It doesn't have to be a company. It could be a project. But we think about, you know, the impact on regulatory oversight, reputational damage, lost revenue. We think of litigation, liquidity impacts, and other types of off-balance sheet liabilities or contingent liabilities that could incur. But if you add the numbers up, they can get very big. So a trillion dollars is a lot of money. But if you compare it against the $22 trillion US GDP, you know, maybe it's it tells you one thing. If you compare it to the global GDP, it gets very small. But if you compare that against the $2 trillion of revenue that global utilities generate every year,
Starting point is 00:21:08 it becomes very large. So as we think about cyber losses, they get dispersed in a large pool. But if they get concentrated in a particular sector or a particular region or a particular asset class, that's when I think we can finally really have that discussion about the macroeconomic impacts of that. Yeah, I think that what you're referring to is I found a citation from the Center for Strategic and International Studies that they estimated that malicious cyber attacks cost the global economy, I believe it was last year, almost a trillion dollars, almost a trillion. And as you said, the U.S. I think the U.S. GDP, I think nominal dollars is $22 trillion. I think that's, and then global GDP is probably about $100 trillion. So that's about 1%. But, you know, if you think about it in the context of like climate, so if you look at the, I was just looking at this, if you look at the total economic cost from acute physical risk, these are, you know, floods and hurricanes and fires, that kind of thing, comes up to about 350 billion per annum.
Starting point is 00:22:16 So, you know, that's obviously a lot, but this dwarfs that, you know, in the grand scheme of things. And it feels like it's rising quickly, right? this doesn't feel like it's going in the other direction here. If anything, it's just going to become more and more costly. It's rising quickly, and that's actually one of the potential statistics game is 4 trillion, 8 trillion, and 21 trillion. Okay, so we're playing the game here now. I just want to throw that out there.
Starting point is 00:22:42 Okay, so I didn't, yeah, that's right. You wanted to play the statistics game in the conversation. So, okay, so we're going to do that. Leslie and Leroy, you have statistics as well? I've heard one if you want one. But I know the answer to Jim, so that's cheating. But I have one with a quiz Jim on later. That's kind of sort of what Ryan does every once in a while, so that's not.
Starting point is 00:23:05 No, I'm the one trying to investigate the collusion between Zandi and Chris over there. Okay, okay, we're going to play the game. The game is we each state a statistic, in this case, it's got to be cyber-related, and the rest of us try to figure that out based on the deductive reason, questioning and clues. So go ahead, Jim. What are the numbers again? 4 trillion, 8 trillion, and 21 trillion.
Starting point is 00:23:29 And this is cyber related. Is it cyber related or is it your cyber million? The 21 trillion is cyber related. The 21 trillion is cyber related. Oh, my goodness. Is this a forecast over different horizons? We looked at what, what, um, told that my sector is most exposed to, to cyber risk, to environmental risk and social risk.
Starting point is 00:23:57 So what he's telling you is $21 trillion of issue debt is highly exposed to cyber risk. 8 trillion, right? 8 trillion is social and 4 is environmental. You know, it's obvious Leslie doesn't understand this game. It's pretty clear. Did I give you all the answers? I mean, like Leslie, what the heck? You know?
Starting point is 00:24:19 No Cal Bell. Yeah. I mean, you might have said ESG. that or something like that it's like okay right she what I'm done with this game we're done okay how is he gonna get it oh you felt bad for us that's fine
Starting point is 00:24:36 I think so bad for you a little bit you're saying you guys look like idiots I'm putting you out of your misery is what you're saying those numbers in fairness we're in the notes that we sent about that but for you know to your point on on four trillion dollars is the amount of debt that we looked at over all the global sector and said these are the sectors that are most exposed to environmental risk, which includes
Starting point is 00:24:57 physical effects of climate change, carbon transition, water management, $4 trillion. Is it $21 trillion? Now, that cyber includes the banking sector. So even if you take the $10 trillion of debt out from the banking sector in that number, you're still higher, almost twice as high as the environmental risk. And the risk is today, as opposed to. to the longer term, the risk of environmental and climate change risk is today, but the runway is longer than it is on cyber. So that's why I threw that. And I didn't mean the jump. No, that's a great
Starting point is 00:25:35 statistic. But just so I understand. So four trillion in outstanding global debt that is at risk of an environmental issue, meaningful. Seven trillion is, you said social risk? Eight trillion social risk and you said 21 trillion in cyber. That's right. And definition is high or highly exposed to that particular risk. And these are all in our heat maps that we publish. Yeah. We have an environmental heat map, a social heat map, and a cyber heat map.
Starting point is 00:26:08 By the way, for the listener, you guys wrote a great white paper that kind of went through this in detail. Is that paper available to the broad public or is that not? Just curious. Do you know? I don't know. Oh, no. Okay. I don't know. Okay. It's a great paper. It's a great paper. Okay. Okay. That's very good. I think we lost Chris. Hopefully he'll find his way back. I think he bailed.
Starting point is 00:26:34 Oh, you think so that number. There was a number. I ruined the game. He stared them off. Yeah. He was, he's annoyed. Okay. Okay. So, so Leslie, you have a, you have a statistic as well? Well, we, we, we, I, I, I, I like the idea of dimensioning cyber. risk. So I was going to try it was it's probably an easy one for you, but it was maybe a harder one for Jim. We'll see. I was going to say if it's a trillion dollars of a global cost, of cyber costs. What is that? What is that equivalent in terms of GDP? What European country is that equivalent to with us for you? Oh, I like this one. Jim, what is what is the
Starting point is 00:27:11 multiple of or what is the multiple of Amazon revenue is that equivalent to? Oh, that's another good ones. Okay, so you're saying, okay, the estimated cost from cyber is a trillion dollars globally. Which European country has annual GDP of about a trillion? About a trillion. Okay. Okay. Well, he's going to name a country, and I'll let Ryan and Chris go first, unless you all guys want me to go first. And Jim, do you know the answer? Don't know the answer. Okay. And Leroy, do you know the answer?
Starting point is 00:27:41 No. Okay. All right. We're going to go around the horn. Okay. Chris, you go first. Oh, sorry. I don't think he looks very confused. Dazed and confused. Ryan, what is it? What country?
Starting point is 00:27:56 Oh, here it is. Chris, you can go. Oh, did you have? I'm having troubles here. Go ahead. So, Ryan, what country is a trillion dollars? I think I know. Romania.
Starting point is 00:28:10 Romania. Are you out of your mind, Romania? Romania. It'd love to be there. That's a good, that's a bad guess, but okay. Jim? Ireland. Oh, that's interesting.
Starting point is 00:28:23 I don't think so, but that's interesting. Leroy? I'm going to say Switzerland, since Leslie's from Switzerland as well. You're as bad as Ryan. Okay, Chris. So which country has GDP? Of a trillion.
Starting point is 00:28:40 Of a trillion. You should know this. The Netherlands. That's a pretty good guess, actually, I think. I'm probably dead wrong. Leslie, is it Italy? Chris, you got it right. A Netherlands.
Starting point is 00:28:54 Oh, Chris. Although I think Italy was also a trillion dollars, Leslie. I'm just saying. I think it's a little bit more than a trillion. Maybe it's a trillion, too. Those 200 billion counts, right? Hold it. Wait a second.
Starting point is 00:29:08 My Switzerland was 800 billion. If it was 2020, it would be a trillion. All right. Now, the other one was interesting, too. You said a trillion is what percent of Amazon annual revenue? What multiple or percent? Amazon's revenue. Wow, that's a great question.
Starting point is 00:29:29 Global revenue for last year. I don't know the answer to that question. I'd say it's probably got to be, guys, you want to take a guess? I'd say $125 billion. So what multiple? Ten times. Ten times. No?
Starting point is 00:29:49 She's looking, she's being very coy. You're really low-balling it there, I have to say. Oh, really? Oh, okay. Times. $500 billion. Is it $500 billion? How much my kids use Amazon?
Starting point is 00:30:02 That's right, Jim. I had no idea. It was that big. $500 billion. I was going to say something about Bezos, but I'm going to practice the thought. Number principle. Yeah, okay. So I won't do that. All right, very good. That was good. Leroy, we're going to come back to you. GDP was $1 trillion back in 1990.
Starting point is 00:30:22 1990? Italy? Italy. Oh, I was really wrong. Yeah, it's one. Oh, no, wait a second. Italy's GDP has not risen at all in 20 years. It's 1.9 trillion. Was it really? One point nine?
Starting point is 00:30:36 Yeah, all that tourism money from Chris. From Chris. All right, let's go back to the topic hand. Hey, Jim, so cyber is obviously a big deal. It's also, it strikes me as being different than other kinds of risks, right? I mean, just in lots of different ways. Do you want to give us a sense of that? Sure.
Starting point is 00:30:59 Well, so cyber is indiscriminates. It does not respect boundaries. It could affect any asset class, any sector, in any region at any time. So from that perspective, it's a little bit unique compared to some of the other risks that we think about. Cyber risk is sort of ubiquitous to an organization because it can affect your reputation and some soft factors like that, as well as hard factors like your liquidity and your revenue. it is, it can show up in any number of ways in organization measures itself. And so from that perspective, it's also a very evolving risk. And because of the digitization that we see taking place across industry and the economy
Starting point is 00:31:53 in general, it's morphing around in novel ways. And so we're always kind of chasing around trying to figure out how best to think about that risk, measure that risk, you know, define that risk and then see how that risk changes over time. It's really been an interesting journey over the last couple of years. And I feel like we finally made it, Mark, because you and I have been talking about this now for a long time. And here it is. And so the geopolitical tensions that have taken. taken place over in Europe right now has really amplified that risk, at least from a governmental perspective. So there's, you know, the U.S. has shields up. We're very on a defensive footing right now to make sure that we have extra protections. And so that risk is probably going to show up in ways that are going to look creative. Hey, when I think, Leslie, about the kind of the nexus between cyber and the broader economy, I kind of think of a few different things, and I'd like to just
Starting point is 00:33:01 throw them out and get your sense of how big a deal it is. The first is around systemic financial risk, that, you know, you think about the payment processors or maybe the exchanges, that if they went down because of a cyber issue, that that would be a problem. Like if I, you know, went to use my M-X card or my master card or visa, and I couldn't, that would be bad, right? That'd instill some panic. Is that, how big a deal is that? Do you think that's a big deal? Systemic financial risk from cyber. I think it's, it's one of those key characteristics of cyber risks that we have to pay close attention to. The banks and regulators are highly attuned to this and really focusing a lot of energy on it. But it's true that if you think about the kind of the sectors that underpin
Starting point is 00:33:49 the functioning of our economy. So think about banking, think about energy. Think about technology, right cloud, those are all highly integrated systems that are very digitized. So like you said, if the SWIF system goes down, you know, it's a huge global issue. If, uh, when we, when we did our survey. That's the international payment system. Yes. Yeah. Right. When we did our survey looking at cloud computing, we asked our, so we asked, we reached out to about 5,000 sure. So we got 300 answers. And of those 1,300 folks that answered, there's 87% of them said that they actually used Microsoft Azure Cloud. So think about that if Microsoft Azure Cloud goes down. And those are folks who answered from all around the world, from all sectors of the economy,
Starting point is 00:34:37 if that cloud goes down, that's another huge issue. And on energy, which is where Jim spends a lot of his time, a lot of the key components that go into producing energy are manufactured by, just a handful of manufacturers. So if those manufacturers get tampered with somehow, the whole energy system could be at risk as well. So it's really, it's a characteristic of cyber risk that's really, that can't be ignored.
Starting point is 00:35:07 So systemic financial risk. So back to the payment processors or the, the exchanges or international payments. Yeah. The cloud services. because they, we're all on the cloud now. And so if that gets hacked and is taken down, that's a big problem for everybody.
Starting point is 00:35:34 You mentioned energy and that, I mean, colonial pipeline shut down as a good case study, good example of that, which was highly disruptive. You didn't mention global supply chains. How big a deal do you think it is for the movement of goods across the globe? Is this a big deal, do you think? Is cyber a real threat there?
Starting point is 00:35:54 Yeah, I think more of that and more like almost a contagion risk concept, more than systemic risk, thinking of what happened with NotPetya, where it's just spreads and start causing disruption across a whole series of industries, which spills into the supply chain. Right. You said Non-Petya. What's that? I think Leroy is the best person given his background to really. Okay. So I guess the Cliff Notes version of NotPetia is that in 2017,
Starting point is 00:36:22 an attack that has been attributed by numerous governments, intelligence agencies, and cybersecurity research companies to the military intelligence of the Russian government, known as the GRU. And that they tampered with the update of the tax software that's mandated by an – it's an accounting company in Ukraine. and basically any entity that files taxes in Ukraine is required to use, or at least was at the time required to use this company's accounting software. So they pushed out this software update that had been tampered with to a whole bunch of entities in Ukraine. And then those entities, in turn, many of them were part of large multinationals,
Starting point is 00:37:12 and it was able to spread worldwide. And it was some what we call Wiper Mout, where they basically destroyed the computers that it landed on. And it just, it caused a number of different repercussions. I'll let Jim talk a little bit about some of the financial impact that took place as a result of that attack. So this was another statistic we were going to use. But eight multinational companies were affected by that, not Petia attack. And they reported about $2 billion worth of financial loss.
Starting point is 00:37:49 $2 billion. And if you add up the balance sheets of those eight companies, it was like a $350 billion balance sheet. So not a lot. Again, to the point. But those eight multinationals had 233 customers that were affected. And they reported $8 billion worth of financial losses associated with it. And again, you know, relatively dispersed and diversified.
Starting point is 00:38:11 But almost 90 of those 233 customers drew their bank lines down across 37 different banks. Now, that could get, you know, interesting very quickly. Luckily, zero credit losses were associated with those bank trucks. So it worked out. But that's a great example of contagion and interdependencies of how everything connects together and why cyber risk is so important from a macroeconomic perspective. There's a few wildcards that are in there that are floating around that we want to try to keep our eyes on. Okay.
Starting point is 00:38:46 So we mentioned systemic financial risk. the threat to the cloud, the energy system, global supply chain doesn't seem like that's as big a direct threat. Anything else? Any other kind of major? So you're sitting at the White House and you're worried about cyber affecting the broader economy. Are there any other kind of choke points, stress points out there that can be exposed by a cyber attack? Anything you would focus on or mention? The only other one to mention, and supply chain kind of hits it a little bit is the stuff that we use all the time. So energy, water systems and things of that nature can be disrupted in some way, shape, or form. When I say energy, I mean not only the fuels, but the electrical power as well.
Starting point is 00:39:40 And, you know, the grids are all interconnected. And as Leslie said, there's only a handful of companies that make the big components that, make energy and power grids work. And so it's a, it's a concentration point. Okay. So it doesn't feel like, it seems it feels like we covered it, that there, you know, there, there, there isn't anything out there that we're just not thinking about significant vulnerability that could be exposed here. We hit up the, what about infrastructure? Like, right, if we took down the, uh, air traffic control system or, you know, shut down a, you know,
Starting point is 00:40:19 port or something, right? Go ahead, Lira. Yeah, I was just going to say that the U.S. government has identified 16 sectors as being critical infrastructure sectors. And I think, I mean, as a result, or at least what it seems as a result of the colonial pipeline incident that happened last May and the geopolitical tensions in Europe, Russia's invasion of Ukraine, that there's been a lot of movement in. in raising the standard and raising the minimum bar
Starting point is 00:40:52 for these critical infrastructure sectors. So we've seen executive orders from the Biden administration, as well as from the government agencies that oversee some of these sectors, saying you need to meet this minimum standard. You have to have somebody who is responsible for cybersecurity in your organization. You need to be doing weekly backups.
Starting point is 00:41:14 Some of these very basic procedures to make sure that these critical infrastructure sectors that so much depends on, and that if something happened to them would cause a lot of hurt to the U.S. economy, have some minimum level of preparedness. I think the psychological damage on consumers would be enormous, right? Even if you lost the air traffic control system for a day, right, how are you going to regain the trust of the public?
Starting point is 00:41:43 That could have significant macroeconomic repercussions, even beyond the direct impact, right? Yeah. I mean, it was funny. We went through this exercise of those 16 critical infrastructure sector. We're working on an update to our heap map, and I was talking to Leroy, and we were talking about assigning systemic risk levels to the sectors. And I think we were looking at, what, 92 sectors, Leroy?
Starting point is 00:42:08 And we were mapping them, and each of one of them kind of fell in one of these 16 critical infrastructure sectors. It's very hard to kind of say, like, this sector is most. impactful to the economy in terms of a cyber attack versus another. Everything's so interconnected. The water sector is hugely vulnerable, right? And important. But we hadn't talked about that either. It's just there's based, I think what we're learning more and more is everybody's exposed.
Starting point is 00:42:38 Last week, we wrote about an attack on an agriculture company. You wouldn't think of agriculture as being exposed to digital theft. right? But it happens. And it just happens that they timed it perfectly was when planting season is. You know, it's almost like as economists, we're thinking about this and how to bring cyber into our forecasting and thinking about the economy. And at this point, we're treating it more just like a cost of doing business, like any other cost. It's not like an existential threat. It could potentially be it's a risk and maybe a scenario. but it's hard to construct a scenario where a big enough part of the economy goes down long enough for it to really take out the economy.
Starting point is 00:43:25 Is that a reasonable way of thinking about it? Or am I missing something? You know, Mark, that has been the view, I think, really since we started to put our collective heads together on this. But it reminds me of the work that's been done over the last five to seven years, that because the costs associated with cyber is relatively manageable, we've only had a handful of companies that have really been permanently or lastingly impacted by cyber risks. But I think that's changing going forward.
Starting point is 00:44:03 So as interconnectivity rises, as digitization increases, as the tools and and methods that a hacktivist or a hacker has continues to get more dangerous in the hands of your average hacker, that the stakes at the table arise. And so it's something to keep an eye on those tail risks in terms of what is an unusual event. And what would happen if one of those events took place in a particular region, or with, within a particular sector, then I think it could change very quickly. Got it. Okay. Hey, you know, Leroy, one thing I find a little perplexing in the context of the Russian invasion of Ukraine is there hasn't been more cyber, at least to my cursory, you know, following of what events.
Starting point is 00:45:02 There hasn't been much on the cyber front here, right? Is that is that right? And is that surprising to you as well? I thought we would see a lot more of a response. And correct me if I'm wrong. But I think Russia is kind of ground zero for a lot of the cyber issues that originate globally. Is that correct to say? That is.
Starting point is 00:45:24 So there's a company called chain analysis. They do research on cryptocurrencies. And based on their research in 2021, 74% of the cryptocurrency movements connected with ransomware went to actors who are what they said, Russia affiliated or Russia-enacted. or Russia connected. So, yeah, that is the case. And as for being surprised about the level of cyber activity in connection with the Russia-Ukraine conflict, I would say yes and no, no in the sense that there have been a lot of cyberactivity.
Starting point is 00:46:01 Microsoft data blog at the end of April saying that six separate Russia-aligned nation-state actors have conducted more than 237 what they call operations. against various Ukrainian entities. And these includes things like destructive attacks that are impacting civilian welfare. But I think what most people were expecting are some of these splashier attacks. So in 2015 and 2016, the Russian military intelligence, again, is accused of turning out the lights in various parts of Ukraine. There was a not peti attack again that wiped out hundreds of thousands of computers in Ukraine around the world. So people were expecting really splashy big scale attacks.
Starting point is 00:46:52 And what we've seen have been more moderate, less splashy attacks, nonetheless impactful for people's lives. And I will say that there's been a lot of attacks back on Russia as well. Not very impactful. They've been these DDoS attacks. So people have been sending lots of traffic, web, traffic to websites and services in Russia. They've been stealing tons and tons of data. One of the more higher profile ones has been the Belarusian or Belarusian, a cyber
Starting point is 00:47:25 activist that have impacted train movements of troops. So again, not big splashy things, but there has been a significant amount of cyber activity. Do you know there's state actors, state sponsored in some form actors in the cyber criminal activities? And then there's this private, non-government related. Is there any sense of or any data related to how much is the result of one or the other? Do we know? Well, one of the really difficult things is that often they're the same, right? So they might wear one hat during the day.
Starting point is 00:48:07 might be a government or nation state affiliated to hacker. And then they do some moonlighting in the evening. And they're financially motivated and using the same techniques or tactics that they're using in their day job to pad their pockets. Before coming to Moody's, I worked at a cyber threat intelligence company where we actually were in these communities, where cyber criminals gather to exchange tools, techniques,
Starting point is 00:48:33 tactics, and also to recruit for their various cyber criminal enterprises. And yeah, it was very difficult to know exactly, well, you don't know what their identities are. So, but there's been some investigations that have shown extensive links, particularly in some countries between their cyber forces and cybercriminals and cyber criminal activity. Yeah, you're a pretty interesting guy. Really interesting. And Leroy, tell them how it's a business. You know, these, they have like HR departments and. No way.
Starting point is 00:49:13 Payroll. Yeah. Payroll. There is a large ransomware gang called the Conti ransomware gang. And there was just a big leak of internal logs from that organization. Somebody was able to steal their communications and publish them. And yeah, you have people writing in saying, hey, I need to take some vacation. time, going off my family somewhere. It is run just like a business is in many respects.
Starting point is 00:49:43 It's the black market. It's underground. It's the black economy. Hey, one other question. You may not know the answer, may not want to respond, but how empowering is crypto to cyber? Is that a big part of empowering the ability to engage in cyber attacks and get paid? Yeah, especially for ransomware attacks, right? So ransomware attacks have technically been around since the late 80s. 1989, there was AIDS ransomware that was distributed on floppy disks to AIDS researchers. But to pay the ransom, you had to send the money to a PO box in Panama. And it turns out that when you go show up to pick up stolen funds or ransom funds that, you know, you can be found, and that person, the author behind that attack was caught and put in jail.
Starting point is 00:50:37 When you get the advent, or at least when cryptocurrency started taking off in the early to mid-2010s, then it became much more feasible for ransomware attacks to happen. And so that's when you started seeing ransomware attacks against individuals in the like $300 to $400 to amount range. And then as time has gone on, it's gone into like the tens of millions of dollar range as they've gotten more sophisticated and more targeted than their tax. Yeah. And what's super interesting about these ransom payments and these criminal organizations is they're largely very disciplined. They take this money and they reinvested in their business to develop more sophisticated weaponry. So going back to that one trillion dollar amount, it's a lot of R&D, right? Oh, geez. That's scary. That thought of that is just really scary.
Starting point is 00:51:30 Oh, goodness. Now, I assume some countries are just better positioned to manage through this than others. I kind of hope the U.S. is in a good position. But Jim, is that the case? And what makes one country more susceptible or more impervious to cyber risk than others? To some degree, everybody is on somewhat of a level playing field in the sense that we're all using the same Internet. you know, those types of capabilities. But there's a clear difference between the resources that are available for some of the developed countries versus some of the more emerging countries that are out there. The United States in particular is very forward leaning on both offensive and defensive
Starting point is 00:52:19 capabilities. We have very, very sophisticated thinking around this. And we continue to work with our friends and allies on that. Yeah, I was reading, I think, in foreign affairs, I can't remember it was around cyber issues. And one of the points being made was that the U.S. is somewhat insulated because the cyber criminals are fearful of retaliation from the United States. So that limits the attacks on the U.S. to some degree, or at least the severity of the attacks. Does that ring true to you? Does that sound right? I'm not sure how much that sounds right.
Starting point is 00:53:02 I'm thinking about, I think a lot of the inbound is in the U.S., and maybe that's just the function of our society. But I'm not going to go ahead, Lee. Yeah, I'll add really quickly that, you know, for cyber criminals, especially financially motivated ones, they have this line that they're trying to walk. They don't want to, they don't want to cause too much of a splash because then that will bring the full force in mind of the U.S. government down on them.
Starting point is 00:53:33 So you think about, we keep referencing the colonial pipeline incident, in that case, because it became such a splashy attack, the cyber criminals themselves came out and said, oh, we didn't mean to, we didn't know it was so important, we didn't mean to hit a pipeline, right? Like, please back off. We've heard from some victims of ransomware attacks that are hospitals that they contact the ransomware gang and say, hey, we're a hospital and the ransomware gangs. Give them the decryption key and say, hey, you know, we're sorry. Please tell the FBI or whatever that, you know, we gave you the key because they don't want the heat. Yeah, empathetic cyber criminals. Yeah, right.
Starting point is 00:54:13 Self-interested, cyber criminals. Yeah, self-interested. It makes a lot of sense. I mean, it's a business, as you said. So they're doing risk management, right? So, you know, like any other good business they're trying to manage their risks that they face. Good. You know, again, back to the report you guys did, I thought it was fabulous and, you know, obviously represented a lot of work, all the survey work that that you did. Hey, Leslie, based on that, you know, are there some things you learn that companies, businesses should be doing, could be doing, or not be doing that would, you know, make them more resilient to managing through cyber threats and risks?
Starting point is 00:54:54 Well, I guess the first thing I say is we're like, at the rating, agency not in the business of giving cyber defense recommendations. So all I can do is talk to, again, financial background. But I can talk to some of the findings, what we learned from the folks that we were able to survey and who generously donated their time to answer us. largely it seems like they're attuned to cyber risk and there's a cyber operations that are being created within the issuers that we surveyed. That means that they have a cyber manager and they have a couple of cyber folks working full time within their organization. And largely they're doing the very bare minimum of what's called cyber hygiene, you know, using multi-factor authentication, scanning their systems. But once you start looking at more advanced forms of ways to mitigate the risk,
Starting point is 00:55:56 you start seeing a very disparate set of responses based on sectors. Banking seems to be way ahead of the pack across the board in terms of how they look at how they govern cyber, in terms of how they manage it from an operational standpoint on day-to-day basis, and even from a risk transfer standpoint. On the other end of the spectrum, not surprisingly, the public sector is lagging. Oh, is that right? Yeah. I mean, it's costly, right?
Starting point is 00:56:23 It's a cost center. So you have limited ways you can allocate a resource in cyber is oftentimes the one that, you know, is probably not the primary focus. Got it. Well, that's not very, that's pretty disconcerting that the public sector so. I guess not surprising, as you point out. What about risk mitigation here on cyber? Is there a way companies can. use the insurance markets or some other form of risk transfer that, you know, to make this,
Starting point is 00:56:55 again, because it feels like this is at this point in time, more of a cost of doing business. So if there's a way to kind of quantify that and compartmentalize it, then you can transfer the risk and make it more manageable. Is that, is that, is that right, that thinking? And is there any efforts along those lines? is that is that even a possibility around the cyber risk? Yes, yes. So there's this thing called standalone cyber insurance or cyber insurance for short,
Starting point is 00:57:26 which is quite popular. I think in our survey, I want to say about 80%, 85% of the folks that responded, said they carried some form of cyber insurance. That always sounds good. And there's some financial benefit to it, but the policy coverages are actually quite small. but where the rest of the benefit is is that you get access to a lot of third-party services.
Starting point is 00:57:51 So if you're attacked, you suddenly have access to experts that can help you with negotiating with the criminals, facilitating the cryptocurrency payments and doing all sorts of forensics. And that's an added benefit. It's not necessarily direct financial, but it's avoidance of cost, I guess. That's beneficial, but it's a very dynamic market.
Starting point is 00:58:14 And maybe Leroy can kind of jump in here, talk about what's happening in the cyber insurance market, because it's changing rapidly. Yeah, I mean, I think this is a good circle back to my stat. So I was going to ask about that because I had not forgotten Leroy. I was going to come back. But you want to do your stat? Sure. I'll do my stat. And, you know, you have a good hint already that it's something related to cyber insurance.
Starting point is 00:58:37 Yeah. And the number is 300%. 300%. Is that the income? increase in the outstanding amount of risk that's insured over the past 10 years? No, past five years. No. Okay.
Starting point is 00:58:57 Can you give us a hint? Well, okay. Is it the increase in premiums? Oh. That's it. Year over year. Oh, no way. Yes.
Starting point is 00:59:06 For some of the hardest it. Wait to go, Jim. Jim. Hey, Ryan, that is a Cal Bell moment. All right. I got to get it. Yeah, as a Calvall moment. Very good. That's great, Jim. Fantastic. 300% from like what to what, do you know?
Starting point is 00:59:25 That's year over year for some of the hardest hit by ransomware sectors. So that includes things like education, government, and manufacturing. Oh, no, wait. I thought that's the increase in the premium. Exactly. Year of year, the increase in premium. The premium last year, was $10,000 and this year it was 300%. $30,000? Yeah, exactly.
Starting point is 00:59:50 Something like that. Yeah. Oh my gosh. And at the same time, the coverage is shrinking for some of these hardest hit sectors. Because when you have to remember that, sorry, that cyber insurance for a long time was focused primarily on first errors and emissions and then on data breaches. And those do not have the same sort of. loss magnitude as ransomware attacks have had. And one of the biggest drivers of that impact
Starting point is 01:00:22 is the business interruption that comes from that. And so the insurance companies, they just weren't ready for it. And they experienced heavy losses. It wasn't profitable for a number of for a number of cyber insurers. And some have even exited the cyber insurance market because they decided it's just not. It's they can't continue to carry it. Yeah, exactly. Yeah, interesting. Okay. Hey, Ryan and Chris, did you guys come up with the statistics?
Starting point is 01:00:51 Did you have a statistic you wanted to throw out to the group? I have one. Did you? Chris can go ahead. Oh, go ahead, Ryan. And then I do want to end. I want to end on a high note. I'm going to ask each of you guys, give me some good news, okay, please, some good news.
Starting point is 01:01:08 Okay. All right, Chris, what's your number? 1834. 1834. Yep. Not the date, not the year 1834. It is a year. Is the year 1834?
Starting point is 01:01:22 Yes. Are you kidding me? 1834? Yep. 1834. 1834. That might be the worst stat ever used. It's related, hold it, wait, it's related to cyber.
Starting point is 01:01:37 Yes. Yes. Oh, is 1834 the name of a form of hacking? Nope. Okay. Is 1834 the name of a criminal cyber group? No. No.
Starting point is 01:01:51 I think there was some event that happened in 1834. Yes. There you go. Of course events in 1834. Cyber related. It was, I think it was some sort of information manipulation or is, am I in the right track? Yeah. Yeah.
Starting point is 01:02:06 Yeah. Apparently. Do you want me to give up? Yeah, go ahead. I give up. All right. Apparently the French telegraph system. was hacked in 1834.
Starting point is 01:02:18 That's good. That might have been the first cyber attack in history. Mondeu. Leroy, Leroy gets a bell, Ryan. He does. He definitely does. That's pretty darn good. That's impressive. That is impressive.
Starting point is 01:02:34 Yeah. All right. Very good. Chris, what's, I mean, Ryan, what is yours? What's your number? 5% to 35%. 5% to 35%? Okay.
Starting point is 01:02:47 So it's a range. It's derange. And it's cyber related. It is. Do you guys know? Any guys, any guesses? Can you give us a hint without giving it away? We kind of touched on it on some of the interconnective.
Starting point is 01:03:10 Probability of a cyber event, major cyber event. in the next year? Nope, no. The percent of people who fail fishing tests in the sector, by industry, 5 percent is the low, 5, 35 percent is the high? No. I'll give you one more hint. Okay.
Starting point is 01:03:38 It was, this estimate comes from the Federal Reserve. Oh, that's interesting. interesting. Cost to businesses or consumers? Cyber costs is a percent of sales. No, it's actually the amount of the impact on the Fed's payment system, 5% to 35% or the payment system would be down if one financial institution would happen. Oh, that's interesting.
Starting point is 01:04:11 That's a good one. That is a good one. That's a good one. Yeah. So we need to see it one more time. Five percent to 35 percent of the Fed's payment system would go down if there's one attack on a financial institution. It's got to be a major. Major, yeah.
Starting point is 01:04:31 Well, that's interesting. Is that the Dallas Fed did that, Brian? Maybe. I got a double check. I don't forget. Okay. That was good. Excellent.
Starting point is 01:04:42 All right. So good news. Any good news here, guys? Let's go around the group from MIS. Jim, any good news? There is good news. The good news is you don't have to be a cyber technician to understand cyber risk. And we see more and more companies adopting the cyber into the traditional risk management frameworks that these companies operate under. because cyber risk is an enterprise-wide risk. It does reside at the board of directors or the trustees and things of that nature. And so we see CFO is getting more involved in making sure that they have the ability to talk about cyber in the same dollars and cents way that they talk about other risks. And they are making estimates on losses and they are making estimates on investments, which may or may not have, you know, revenue growth or volume growth associated with it,
Starting point is 01:05:40 but certainly has volume protection or. revenue protection associated with it. And so they're moving in the direction of being able to articulate that through the traditional rate risk management systems that they have. I think that's a really good piece in news. That is. You know, I'm on a couple of words, and I'll have to say hypervigilant about cyber risk, of all the risks, and I'm not sure he's even rational how sensitive we are to cyber,
Starting point is 01:06:07 given all the other risks that we face. But that's the one thing you just don't want to ask. happen, is that, you know, have a ransomware threat. So very, very, you know, goes through auditing, have auditors come in, take a look at your processes, making sure that there's no gaps or no holes, you know, making sure that we're filling any holes as rapidly as you can. So that, you know, just based on my very limited experience, it feels like, you know, U.S. companies and businesses are really focused on this as an issue.
Starting point is 01:06:35 Yeah. Leroy, any good news? Yes. And coming from you, this really means something. So my piece of good news is that based on the results from our cyber survey, most of the vast majority of the organizations that we spoke with are implementing the basic cybersecurity practices. So again, things like weekly backups, having an incident response plan using multifactor
Starting point is 01:07:08 authentication. And that's really good news because the majority of cyber attacks. that are happening are basic and they can be thwarted using these basic techniques. And so it's good to see that there's such a widespread adoption. That's my wife slinking back here, just so you know. That's a good one. That's a really good one. And Leslie, lead us out with really, really good news.
Starting point is 01:07:36 Great. So what I would say is there's new SEC guidance out there for cyberdisclose. which means that we should start getting more data about the cyber events, which is in our view very positive. We can do better modeling. Better modeling means better decision-making. So there's a big movement towards more integrating cyber risk quantification so that you can kind of estimate your dollars at risk based on different types of scenarios. And then you can prioritize your investments in cyber, which should lead to much better outcomes going on. When are we going to get more SEC information from the SEC?
Starting point is 01:08:14 Do you know? When's that? They are in the review period right now. I believe the review period ends in June. Okay. And part of the guidance that they put forward is that you need to disclose material cyber attacks within the four days of determining that they are material. Great.
Starting point is 01:08:29 Well, that's encouraging. Yeah, that is good news. So, okay, we covered a lot of ground here. Anything that you think we missed? Just kind of an open-ended question, just in case I didn't miss any. I miss something that we should talk about. Anything, Jim, Leroy, Leslie, Chris, Ryan, anything? No?
Starting point is 01:08:51 Okay. All right. I have one question. Yeah, far away. Good question. Economics related. And I don't think there's a known answer here. Do you think that cyber attacks go up or down in recessions?
Starting point is 01:09:04 Are they pros, pro-cyclical or counter-sical? That's interesting. I'm going to go with, they're going to go up. like all crime right probably i think crime actually goes down in recession right people are at home right there's a property crime maybe oh oh yeah maybe yeah oh i thought okay that's interesting so your instinct is that they'll go up in in the downturns this is a source of income revenue yeah that's just also because the trend has been off and it continues to go up yeah you know okay so there's no connection then it's just it might be disconnected
Starting point is 01:09:41 It might be disconnected. Okay, very good. Well, I want to thank you guys for spending so much time with this and really appreciate it and learned a lot. And looking forward to your next study. It sounds like you've got a lot of work here ongoing and doing a lot of really great work. So thank you for that. And with that, we're going to call this a podcast. Thank you, everyone.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.