Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Managing Cyber Risks: Understanding Systemic Risks in Financial Markets, Study notes of Law

CybersecurityRisk ManagementInformation Systems SecurityFinancial Markets

The significance of cyber risks as systemic risks in the global economy, the interconnectedness of financial institutions, and the methods for managing and mitigating these risks through various tools and regulations. It also touches upon the history of risk management and the importance of stress testing.

What you will learn

  • What are the different types of financial risks faced by financial institutions?
  • How has the history of risk management evolved in the financial industry?
  • What are the methods for managing and mitigating systemic risks?
  • How does the business model of conventional depository banks create an asset-liability mismatch?
  • What is the role of risk management in financial institutions?

Typology: Study notes

2021/2022

Uploaded on 08/01/2022

hal_s95
hal_s95 🇵🇭

4.4

(620)

8.6K documents

1 / 46

Toggle sidebar

Related documents


Partial preview of the text

Download Managing Cyber Risks: Understanding Systemic Risks in Financial Markets and more Study notes Law in PDF only on Docsity! 547 ESSAY MANAGING CYBER RISKS Kristin N. Johnson* TABLE OF CONTENTS I. INTRODUCTION .................................................................... 548 II. UNDERSTANDING, MANAGING, AND MITIGATING SYSTEMIC RISKS .................................................................. 556 A. IDENTIFYING RISKS ........................................................ 556 B. WHY ARE SYSTEMIC RISKS SPECIAL? .............................. 559 1. Understanding Systemic Risks .............................. 560 2. A Brief Survey of Risk Management Approaches .... 561 C. SYSTEMIC RISK MITIGATION ........................................... 565 III. EMERGING SYSTEMIC RISK CONCERNS: CYBERSECURITY THREATS .................................................. 568 A. DEFINING CYBERSECURITY THREATS ............................. 569 B. CYBER RISKS AND FINANCIAL INSTITUTIONS ................. 571 IV. REGULATING CYBERSPACE .................................................. 576 A. TOWARD TRANSPARENCY AND INFORMATION SHARING ... 577 1. The Cybersecurity Information Sharing Act of 2015 ......................................................................... 578 2. Weaknesses of the CISA .......................................... 580 B. ALTERNATIVE INITIATIVES ............................................ 583 V. CONCLUSION ....................................................................... 591 * Professor of Law, Director of the Regulation, Governance, and Risk Management Program, Seton Hall University Law School; B.S., Edmund A. Walsh School of Foreign Service, Georgetown University; J.D., University of Michigan Law School. For his careful review of earlier drafts, I thank Carlos Lopez. I am indebted to Tom Lin and Scott Shackelford for their generous responses to my earliest musings on the subject of this Essay. For significant research assistance, I thank my research assistant Sarah Wilbur. 548 GEORGIA LAW REVIEW [Vol. 50:547 I. INTRODUCTION Cybersecurity concerns are an ever-increasing threat.1 The rising cost, frequency, and severity of data breaches2 now dominate risk management discussions.3 Over the last ten years, more than 4,000 known data breaches have shocked, debilitated, and even (temporarily) paralyzed markets.4 Commentators estimate that potentially billions of records containing confidential or sensitive data have been compromised.5 Experts suggest that data breaches cost the global economy more than $400 billion dollars of losses annually.6 Heads of state around the world have committed to enhance cybersecurity, to protect intellectual property and confidential or sensitive data, and to aggressively 1 See Tom C.W. Lin, Financial Weapons of War, 100 MINN. L. REV. 1377, 1381 (2016) (discussing financial infrastructure as a “new theater of war”); Matthew Goldstein, Brokerage Firms Worry About Breaches by Hackers, Not Terrorists, DEALBOOK, N.Y. TIMES (Feb. 3, 2015, 11:54 AM), http://dealbook.nytimes.com/2015/02/03/brokerage-firms-most-wo rried-about-hackers-and-rogue-employees-finra-report-sa ys/?_r=0 (discussing the threat of hacking faced by financial firms); Sam Jones, Cyber Security: Business Is in the Front Line, FIN. TIMES (Apr. 29, 2014, 10:35 AM), http://www.ft. com/intl/cms/s/0/11b41ac4-c3cb-11e3- a8e0-00144feabdc0.html#axzz3hFamiepE (noting an increase of data breaches by 63% in 2013); see also David E. Sanger & Julie Hirschfeld Davis, Hacking Linked to China Exposes Millions of U.S. Workers, N.Y. TIMES (June 4, 2015), http://www.nytimes.com/2015/06/05/us/ breach-in-a-federal-computer-system-exposes-personnel-data.html (reporting that a large breach of federal employees’ data originated in China). 2 Data breaches occur when cybercriminals hack into businesses or corporations to steal confidential information such as credit and debit card numbers, e-mail addresses, and phone numbers. E.g., Rachael M. Peters, So You’ve Been Notified, Now What? The Problem with Current Data-Breach Notification Laws, 56 ARIZ. L. REV. 1171, 1173 (2014) (discussing sizable data breaches at Target, Home Depot, and JPMorgan Chase). 3 See infra Part II.B.2. 4 Protecting Consumer Information: Can Data Breaches Be Prevented? Hearing Before the H. Subcomm. on Commerce, Mfg., and Trade, 113th Cong. 1–2 (2014) (statement of Lisa Madigan, Att’y Gen. of Illinois), http://energycommerce.house.gov/hearing/protecting-consu mer-information-can-data-breaches-be-prevented. 5 See CTR. FOR STRATEGIC & INT’L STUDIES, NET LOSSES: ESTIMATING THE GLOBAL COST OF CYBERCRIME 3 (2014), http://mcafee.com/US/resources/reports/np-economic-impact-cyber crime2.pdf (“The cost of cybercrime includes the effect of hundreds of millions of people having their personal information stolen—incidents in the last year include more than 40 million people in the US, 54 million in Turkey, 20 million in Korea, 16 million in Germany, and more than 20 million in China. One estimate puts the total at more than 800 million individual records in 2013.”). 6 Id. at 2. 2016] MANAGING CYBER RISKS 551 credit and debit account information and 53 million customers’ e- mail addresses.18 In both the Target and Home Depot data breaches, malicious software (malware) infected the business’s cash register system enabling hackers to view, record, and alter data.19 One risk from such a breach of customers’ credit and debit card information and personal data is that hackers may make counterfeit cards and commit fraud.20 Research firm Aite estimates that the costs of counterfeit fraud reached $1.35 billion in 2008 and accounted for 15.7% of the total $8.6 billion in credit and debit card fraud in the same year.21 These large-scale data breaches are not unique to chain retailers. While cyberattacks against retailers are troubling, hackers’ efforts to breach the firewalls of financial institutions and exchanges at the center of international commercial enterprise— financial institutions—could threaten to destabilize global economic systems. The architecture of modern markets makes financial institutions critical to global commerce and to the operations of local, state, national, and foreign governments.22 The universe of 18 Shelly Banjo, Home Depot Hackers Exposed 53 Million Email Addresses, WALL ST. J. (Nov. 6, 2014, 8:03 PM), http://www.wsj.com/articles/home-depot-hackers-used-password-stole n-from-vendor-1415309282; see also Maggie McGrath, Home Depot Confirms Data Breach, Investigating Transactions from April Onward, FORBES (Sept. 8, 2014, 5:32 PM), http:// www.forbes.com/sites/maggiemcgrath/2014/09/08/home-depot-confirms-data-breach-investigat ing-transactions-from-april-onward/ (discussing Home Depot’s payment data systems breach). 19 See Banjo, supra note 18 (“The hackers evaded detection in part because they moved around Home Depot’s systems during regular daytime business hours and designed the malware to collect data, take steps to transmit it to an outside system and erase its traces.”); Andrea Peterson, Secret Service Estimates Type of Malware that Led to Target Breach Is Affecting Over 1,000 U.S. Businesses, WASH. POST (Aug. 22, 2014), https://www.washingtonpo st.com/news/the-switch/wp/2014/08/22/secret-service-estimates-type-of-malware-that-led-to-tar get-breach-is-affecting-over-1000-u-s-businesses/ (“The malware remotely exploits businesses’ administrator accounts and steals consumer’s [sic] payment data, such as their credit and debit card numbers.”). 20 For a general discussion of the concept of risk, see infra Part II.A. 21 FED. RESERVE SYS., THE 2013 FEDERAL RESERVE PAYMENTS STUDY: RECENT AND LONG- TERM PAYMENT TRENDS IN THE UNITED STATES: 2003–2012, at 41 tbl.3.3.1, 42 tbl.3.3.2 (2013), https://www.frbservices.org/files/communications/pdf/research/2013_payments_study_summa ry.pdf. 22 See infra Part III.A. 552 GEORGIA LAW REVIEW [Vol. 50:547 financial institutions is broad. It includes conventional depository banks, as well as securities, commodities, and derivatives platforms or exchanges; investment banks, hedge, pension, and mutual funds; brokerage firms; and, in some cases, insurance companies. Pursuant to federal regulation and consistent with their business models, large financial institutions acquire, collect, and retain significant volumes of personal information. Possession of and control over this sensitive data makes financial institutions and retailers highly attractive targets for hackers.23 Shocking examples of breaches at financial institutions underscore these concerns. In 2013, hackers penetrated network systems at both Citibank and JP Morgan Chase.24 Consequently, hackers accessed the data related to tens of thousands of customer accounts. While the threat to individual financial institutions is alarming, the significance of the largest financial institutions in the global economy, the interconnectedness of these businesses, and their shared dependence on technology create a new body of systemic risk concerns.25 If hackers successfully disrupt the sources of securities and commodities exchange platforms or the transaction network of the payment and banking system, the devastation and damage would trigger a chain of negative 23 See Doug Carroll, Banks Admit Growing Cyberattack Risks, USA TODAY (Aug. 28, 2014, 4:06 PM), http://www.usatoday.com/story/money/business/2014/08/28/banks-growing-c yber-security-risks/14741653/ (highlighting financial firms’ responses to cybercrime risks); Jones, supra note 1 (“As many of the world’s largest companies are beginning to realise, the threat to their margins, their brands and even their continued existence from cyberattacks is no longer an abstract risk they can ignore.”); R. Andrew Patty II, Credit Card Issuers’ Claims Arising From Large-Scale Data Breaches, 28 J. TAX’N FIN. INST. 5, 5 (2015) (“[L]arge collections and streams of information in the possession or control of major retailers and other merchants associated with specific financial accounts held at card-issuing financial institutions have proven to be tempting targets for bad actors who are seeking pecuniary gain or striving to sabotage infrastructure for political or ideological reasons.”). 24 Randall Smith & Alison Tudor, Citi, Confirming Breach, to Issue Tens of Thousands of New Cards, WALL ST. J. (June 9, 2011, 6:22 PM), http://www.wsj.com/articles/SB10001424052 702304259304576374713184158184; Emily Glazer & Danny Yadron, J.P. Morgan Says About 76 Million Households Affected by Cyber Breach, WALL ST. J. (Oct. 2, 2014, 9:32 PM), http:// www.wsj.com/articles/j-p-morgan-says-about-76-million-households-affected-by-cyber-breach- 1412283372. 25 See generally Lawrence G. Baxter, Betting Big: Value, Caution and Accountability In an Era of Large Banks and Complex Finance, 31 REV. BANKING & FIN. L. 765 (2012) (discussing the costs and benefits of large-scale financial institutions). 2016] MANAGING CYBER RISKS 553 consequences for businesses, governments, and individuals around the world. Cyber risks are evolving and this metamorphosis requires a prompt regulatory response. Unlike liquidity, credit, market, and other types of financial market risks, cyber risks threaten to trigger a series of losses far more debilitating than a run on any individual financial institution. Cyber risks, by their nature, reflect a sophisticated and complex concern. Cyber risks threaten disruptive attacks against interconnected and systemically important banking and non-banking financial institutions. Even a temporary disruption in banking, payment, and financial instruments trading platforms may destabilize markets. The consequences of a well-targeted cyberattack cast a shadow that may reach institutions and individuals all over the country and possibly in many countries around the world. It is possible that concerns regarding cyber threats and financial markets are overstated. While cyberattacks have yet to undermine the national economy, hackers continue to develop new methods of penetrating proprietary systems. The Carbanak cyberattack in 2013 evinces the imminent nature and high probability of this new front and establishes that we are on the edge of a new digital frontier.26 In late 2013, the Carbanak cybergang unleashed a cyberattack on more than one hundred financial institutions across thirty different countries.27 Over a period of several months, Chinese and European hackers remotely programmed automatic teller machines (ATMs) to dispense cash and transfer millions of dollars in funds from customers’ accounts in Europe, the United States, and Japan.28 Hackers gained control over the internal operational systems of the individual financial institutions by baiting bank employees with e-mails that appeared to be from colleagues, urging the employees to download malware.29 For nearly two 26 Sanger & Perlroth, supra note 14 (“[T]he ‘Carbanak cybergang,’ named for the malware it deployed, represents an increase in the sophistication of cyberattacks on financial firms.”). 27 See id. (“[T]he scope of the attack . . . could make it one of the largest bank thefts ever.”). 28 Id. 29 Id. 556 GEORGIA LAW REVIEW [Vol. 50:547 federal agency-proposed alternatives to the growing cyber risks that threaten domestic and international financial institutions. II. UNDERSTANDING, MANAGING, AND MITIGATING SYSTEMIC RISKS Financial market regulation and literature exploring regulation frequently implore market participants to take action to reduce the likelihood that “systemic risks” will materialize. The notion of systemic risk animates discussions regarding the causes of the recent financial crisis and justifications for the imposition of regulation designed to prevent future crises. Notwithstanding the use of this popular term, there is no widely accepted or uniform definition of systemic risk. Unable to define systemic risk, scholars, commentators, and regulators struggle to develop well- tailored regulation to manage and mitigate systemic risk. Part II.A identifies several commonly occurring risks in financial markets. Part II.B argues that the definition of systemic risk is evolving, creating challenges for regulators attempting to manage or mitigate systemic risk. A. IDENTIFYING RISKS The term risk is used colloquially to suggest that an action or decision may lead to a negative outcome.35 In truth, risk taking may lead to either a positive or negative outcome.36 Risk simply describes an element of uncertainty or the chance for a range of possible outcomes.37 35 Cf. GEOFFREY PARSONS MILLER, THE LAW OF GOVERNANCE, RISK MANAGEMENT, AND COMPLIANCE 535 (2014) (“The traditional notion conceives of risk as the chance of something bad happening . . . . The more modern approach, however, sees the chance of something bad happening as only one aspect of risk. A more general understanding would also include the chance of something good happening. Risk in this sense is measured by the dispersal of outcomes rather than simply the chance of a bad one.”). 36 Id. 37 See Roger Miller & Donald Lessard, Evolving Strategy: Risk Management and the Shaping of Large Engineering Projects 4 (MIT Sloan Sch. of Mgmt., Working Paper No. 4639-07, 2007), http://ssrn.com/abstract=96260 (“Risk is the possibility that events, their resulting impacts, and their dynamic interactions will turn out differently than anticipated. Risk is typically viewed as something that can be described in statistical terms, while 2016] MANAGING CYBER RISKS 557 Financial markets and financial institutions face various classes of risk including credit, liquidity, interest rate, and market risk.38 Lending arrangements give rise to credit risks or concerns that a debtor may fail to repay an outstanding debt obligation. There are several types of contractual arrangements that create credit risk. When a creditor, such as a local community bank, extends a loan to a borrower to buy a home, the possibility that the borrower will not repay the outstanding principal or interest obligation creates a credit risk.39 Credit risks are an immutable characteristic of lending arrangements and arise in contracts involving a diverse spectrum of borrowers.40 Liquidity risks involve the potential that the debt obligations of an enterprise may exceed the assets of the business.41 Consider, for example, the activities of a conventional depository bank that maintains savings account deposits and issues home loans. The bank may face a liquidity crisis if all savings accountholders run to the bank demanding return of their deposits at a time when the bank has issued their deposits to borrowers seeking home loans. The residential mortgages may have terms of ten, twenty, or thirty uncertainty is viewed as something that applies to situations in which potential outcomes and causal forces are not fully understood.”). 38 ANTHONY SAUNDERS & MARCIA MILLON CORNETT, FINANCIAL MARKETS AND INSTITUTIONS 576 tbl.19-1 (5th ed. 2012). Credit risk, for example, is “the risk that promised cash flows . . . may not be paid in full.” Id. Liquidity risk may result from unexpected liability that forces a firm “to liquidate assets in a very short period of time and at low prices.” Id. Interest rate risk is “incurred . . . when the maturities of [a firm’s] assets and liabilities are mismatched and interest rates are volatile.” Id. Financial institutions face these and several other risks. See, e.g., id. (defining risks in financial institution). Because the attributes of the business models of financial institutions vary, the risks described here may present differently for each type of financial institution. 39 See Heath Price Tarbert, Comment, Are International Capital Adequacy Rules Adequate? The Basel Accord and Beyond, 148 U. PA. L. REV. 1771, 1775 (2000) (“The bank’s role as a financial intermediary involves many specific risks, of which the most predominant is credit risk—that a borrower will default on a loan.”); Kristin N. Johnson, Governing Financial Markets: Regulating Conflicts, 88 WASH. L. REV. 185, 206 (2013). 40 See Kristin N. Johnson, Addressing Gaps in the Dodd-Frank Act: Directors’ Risk Management Oversight Obligations, 45 U. MICH. J.L. REFORM 55, 64 (2011) (“Large, complex financial institutions originate loans to many types of borrowers including corporations with operations around the world; other banks, thrifts, and more sophisticated financial institutions; hedge funds; and private equity firms.”). 41 FDIC RMS MANUAL OF EXAMINATION POLICIES, LIQUIDITY AND FUNDS MANAGEMENT § 6.1-2 (2015). 558 GEORGIA LAW REVIEW [Vol. 50:547 years. In this situation, the bank could not return savers’ deposits until borrowers repay residential mortgages. The business model of conventional depository banks creates an asset-liability mismatch.42 If customers make a run on the bank and the bank must dispose of assets at fire sale prices, the bank may suffer substantial financial losses.43 Another common type of financial risk—interest rate risk—is intimately related to liquidity risk.44 Interest rates reflect the price at which banks agree to lend to borrowers, including other financial institutions.45 Interest rates enable lenders to limit exposure when matching short-term assets and long-term liabilities.46 Interest rates and asset trading prices comprise a broader category of risks—market risks. This category of risk arises from sudden changes in the prices of frequently traded assets or pricing benchmarks.47 Firms engaged in the purchase and sale of securities, commodities, raw materials, and various manufacturing industries all navigate the challenges of market risk.48 The active equity and debt securities or commodities 42 When a financial institution does not possess the necessary cash to satisfy a withdrawer request, the institution “may have to sell some of their less liquid assets to meet the [demands].” SAUNDERS & CORNETT, supra note 38, at 579. 43 See id. (providing examples of financial institutions that experienced severe distress after a “run” by depositors on cash deposits). 44 Interest rate risk can occur when financial institutions “mismatch[ ] the maturities of its assets and liabilities as part of its asset transformation function.” Id. at 580. Longer maturity assets pose increased risk for financial institutions because interest rates can change from year to year. OFFICE OF INVESTOR EDUC. & ADVOCACY, SEC. & EXCH. COMM’N, SEC PUB. NO. 151, INVESTOR BULL.: INTEREST RATE RISK—WHEN INTEREST RATES GO UP, PRICES OF FIXED-RATE BONDS FALL 4 (2013), http://www.sec.gov/investor/alerts/ib_interestr aterisk.pdf. Interest rate risk encompasses the following: refinancing risk, a type of interest rate risk where the “the cost of refinancing can be more than the return earned on asset investments”; reinvestment risk, “[t]he risk that the returns on funds to be reinvested will fall below the cost of funds”; and price risk, “the risk that the price of the security will change when interest rates change.” SAUNDERS & CORNETT, supra note 38, at 581–82. 45 Lending Rates, BANK OF CAN. (Oct. 2011), http://www.bankofcanada.ca/wp-content/up loads/2010111/lending_rates.pdf (explaining how banks set interest rates). 46 SAUNDERS & CORNETT, supra note 38, at 580. 47 Id. at 582. See generally BASEL COMM. ON BANKING SUPERVISION, BANK FOR INT’L SETTLEMENTS, AMENDMENT TO THE CAPITAL ACCORD TO INCORPORATE MARKET RISKS (2005), http://www.bis.org/publ/bcbs119.pdf (providing for the measurement of market risk). 48 Johnson, supra note 40, at 63–64. 2016] MANAGING CYBER RISKS 561 This approach captures the elements of systemic risk that scholars commonly accept and goes further to encompass Frederic Mishkin’s proposition that systemic risk is “the likelihood of a sudden, usually unexpected, event that disrupts information in financial markets, making them unable to channel funds to those parties with the most productive investment opportunities.”54 As the Federal Reserve has explained, systemic risks arise when important financial institutions, such as payment systems, experience disruptions that trigger a domino effect of consequences. According to the Federal Reserve, [S]ystemic risk may occur if an institution participating on a private large-dollar payments network were unable or unwilling to settle its net debit position. If such a settlement failure occurred, the institution’s creditors on that network might also be unable to settle their commitments. Serious repercussions could, as a result, spread to other participants in the private network, to other depository institutions not participating in the network, and to the nonfinancial economy generally. A Reserve Bank could be exposed to indirect risk if Federal Reserve policies did not address this systemic risk.55 Exploring the methods of mitigating and managing systemic risks further clarifies the contours of systemic risks. 2. A Brief Survey of Risk Management Approaches. Risk management is a central pillar in financial market stability and a 54 Frederic S. Mishkin, Comment on Systemic Risk, 7 RES. FIN. SVCS. PRIV. & PUB. POL’Y 31, 32 (1995) (“Systemic risk is the likelihood of a sudden, usually unexpected, event that disrupts information in financial markets, making them unable to effectively channel funds to those parties with the most productive investment opportunities.”). 55 Policy Statement on Payments System Risk, 66 Fed. Reg. 30,199, 30,200 (Bd. of Governors of the Fed. Reserve Sys., 2001). 562 GEORGIA LAW REVIEW [Vol. 50:547 key element in financial market regulation.56 Scholars describe efforts to identify, assess, or mitigate outcomes that could lead to losses as risk management strategies.57 Successful risk management strategies may engender a multitude of benefits and are as diverse as the businesses and industries that adopt them. To manage risks, business may rely on a wealth of endogenous tools, such as enterprise risk management (ERM) strategies58 or corporate governance structures, and exogenous solutions, such as minimum capital ratios or living wills.59 Risk management thus “involves organizational processes that generally include risk identifying, measuring, and mitigating procedures.”60 Risk management is, “at its most fundamental level . . . about identifying bad outcomes that could occur in an uncertain future and taking deliberate action to shift the odds in a firm’s favor.”61 Modern risk management theory began at the turn of the twentieth century when Louis Bachelier pioneered a model of 56 See generally Pierre Duguay, Dep’y Governor, Bank of Can., Remarks to the Risk Management Association, Toronto Chapter, Toronto, Ontario (Jan. 8, 2009) (explaining the importance of risk management strategies to achieve financial stability). 57 E.g., Nizan G. Packin, It’s (Not) All About the Money: Using Behavioral Economics to Improve Regulation of Risk Management Financial Institutions, 1 U. PA. J. BUS. L. 419, 434 (2012) (“Risk managers . . . attempt to reduce the likelihood of negative outcomes.”); Johnson, supra note 40, at 61 (“[M]ethods developed to measure, mitigate, or manage risk generally focus on estimating the probability and magnitude of risks that lead to losses.”); Miller & Lessard, supra note 37, at 8 (describing several risk management techniques). 58 See Kristin N. Johnson, Macroprudential Regulation: A Sustainable Approach to Regulating Financial Markets, 2013 U. ILL. L. REV. 881, 899 (describing the complexity of the risk management strategies businesses adopt, including ERMs, which “attempt to comprehensively measure risks”). 59 See Victoria McGrane & James Sterngold, Fed Sets Tough New Capital Rule for Big Banks, WALL ST. J. (Dec. 9, 2014, 8:43 PM), http://www.wsj.com/article/fed-proposes-extra- capital-requirement-for-8-biggest-u-s-banks-1481507 (noting regulatory imposition of “fatter capital cushions . . . to make the financial system less risky”); Ryan Tracy & Victoria McGrane, Big U.S. Banks Refile ‘Living Wills’ After Regulatory Rebuke, WALL ST. J. (July 6, 2015, 10:53 PM), http://www.wsj.com/articles/big-us-banks-refile-living-wills-after-regulatory- rebuke-1436212747 (reporting that, among others, JP Morgan Chase & Co. re-submitted plans for reorganization to help mitigate damage in the event of financial failure). See generally RENÉ STULZ, RISK MANAGEMENT AND DERIVATIVES (2003) (providing insight into the way businesses can maximize corporate value through various risk management techniques). 60 Johnson, supra note 40, at 63. 61 Robert Weber, A Theory for Deliberation-Oriented Stress Testing Regulation, 98 MINN. L. REV. 2236, 2251 (2014) (citing DAN BORGE, THE BOOK OF RISK 4 (2001)). 2016] MANAGING CYBER RISKS 563 Brownian motion to analyze fluctuations in the prices of financial assets.62 In 1939, the American Finance Association met for the first time, and in 1942, they published their first journal, American Finance.63 The decades that followed ushered in a period of innovation in risk management.64 Mathematicians and physicists embraced their celebrated role among financial institutions and developed asset pricing models such as the Black- Scholes options pricing formula and the Noble prize-winning Capital Asset Pricing Model.65 Both models enjoyed tremendous popularity. Beginning in the early 1970s with the collapse of the Bretton Woods system, financial product engineers began to design newly styled currency derivatives products.66 Financial product engineers posited that these derivatives, currency futures, and options and interest rate swaps would reduce risk exposure and facilitate hedging.67 During the 1980s and 1990s, market participants engineered and encouraged the development of hedging products including default and credit risk management tools.68 In the late 1980s, the Basel Committee on Banking Supervision initiated a series of discussions among the central banking authorities of the nations with the largest economies in the world; the discussions led several countries to implement the 1988 Basel Accord—a body of regulations designed to manage risks in the banking industry.69 62 GEORGES DIONNE, RISK MANAGEMENT: HISTORY, DEFINITION AND CRITIQUE 6 (2013), http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2231635. 63 Id.; see also About the Association, AM. FIN. ASS’N, http://www.afajof.org/details/page/37 10241/About-the-Association.html (last visited Sept. 20, 2015). 64 DIONNE, supra note 62, at 7. 65 Press Release, Royal Swedish Acad. of Scis., The Prize in Economics 1990 (Oct. 16, 1990), http://www.nobelprize.org/nobel_prizes/economic-sciences/laureates/1990/press.html; PHILLIPE JORION, VALUE AT RISK 417–18 (3d ed. 2007) (describing CAPM). 66 Shinhua Liu, Currency Derivatives and Exchange Rate Forecastability, 63 FIN. ANALYST J. 72, 72 (2007). 67 See Arthur E. Wilmarth, Jr., The Transformation of the U.S. Financial Services Industry, 1975–2000: Competition, Consolidation, and Increased Risks, 2002 U. ILL. L. REV. 215, 332–33 (noting how the availability of new financial “tools” such as derivatives led to increased hedging by financial institutions). 68 DIONNE, supra note 62, at 8. 69 Id. 566 GEORGIA LAW REVIEW [Vol. 50:547 ease as market participants simultaneously transact with counterparties in any number of countries around the world.83 An international network of exchanges and clearinghouses enable financial market participants to execute many of the world’s most significant transactions, transferring cash, securities, commodities, and other assets across national borders in seconds.84 Technological innovations in international banking, payment, and settlement systems increasingly facilitate cross-border transactions.85 Advancing technology will increasingly ensure that financial market transactions are uninhibited by conventional boundaries. The development of infrastructural resources, such as international banks, bank holding companies, securities and commodities exchanges, and clearinghouses facilitates the execution of cross-border transactions.86 These institutions also provide critical benefits, enhance market efficiency, permit more accurate price discovery, and promote greater portfolio diversification.87 The engineering of these critical market actors application of the tragedy of the commons parable to financial markets offers alternative solutions to regulatory questions prompted by cross-border transactions or financial market sectors characterized by market participants executing transactions through trading institutions operating in multiple jurisdictions. 83 See JAMES MANYIKA ET AL., MCKINSEY GLOBAL INST., GLOBAL FLOWS IN A DIGITAL AGE: HOW TRADE, FINANCE, PEOPLE, AND DATA CONNECT THE WORLD ECONOMY 23, 61 (2014) (discussing the increasingly international nature of commercial transactions). 84 See Chris Brummer, Post-American Securities Regulation, 98 CAL. L. REV. 327, 346 (2010) (discussing how “innovations like the Internet” have drastically improved the rapidity and accuracy of international sales transactions). 85 MANYIKA ET AL., supra note 83, at 37 (“[W]e see huge growth in the digital portions of flows of goods and services—a process we call digitization.”). 86 See Stavros Gadinis & Howell E. Jackson, Markets as Regulators: A Survey, 80 S. CAL. L. REV. 1239, 1257–58, 1298 (2007) (concluding that many stock exchanges are “expanding their operations across national borders”). 87 See Jeremy C. Kress, Credit Default Swaps, Clearinghouses, and Systemic Risk: Why Centralized Counterparties Must Have Access to Central Bank Liquidity, 48 HARV. J. ON LEGIS. 49, 65 (2011) (“The benefits of [clearinghouses] include loss mutualization and credit risk homogenization, multilateral netting, and information aggregation.”); Jerry W. Markham & Daniel J. Harty, For Whom the Bell Tolls: The Demise of Exchange Trading Floors and the Growth of ECNs, 33 J. CORP. L. 865, 882 (2008) (stating that the transparency of modern stock exchanges “provides a price discovery mechanism”); Johnson, supra note 39, at 189, 209 (noting that self-regulatory organizations, including financial institutions such as the British Banker’s Association, “frequently adopt and implement 2016] MANAGING CYBER RISKS 567 and payment, trade, and settlement businesses, however, has also engendered endemic problems. Regulatory efforts in the wake of the recent financial crisis reveal a fundamental concern growing in tandem with the burgeoning and deeply interconnected relationships among international financial market participants and financial institutions. No single international financial market regulator exercises the authority to address the lack of effective regulation in international financial markets. While funds and assets flow across national borders with ease, jurisdictional limitations circumscribe the scope of national regulators’ authority.88 Conventional wisdom suggests that nations may regulate activities within their borders. But when transactions in one nation create market consequences in another nation, regulators, in limited cases, will impose restraints on the foreign actors engaging in the activity that affects their domestic markets.89 Generally, however, each nation regulates the market participants domiciled, and the transactions executed, within its territorial boundaries. 90 From this background, one should note that a dearth of information regarding domestic or foreign market participants in any market or the failure of regulators to collect and share information in a timely manner stymies efforts to quell systemic industry standards that enhance efficiency and organization,” and that complex financial instruments, such as credit derivative agreements, help diversify investor portfolios). 88 See Pierre-Hugues Verdier, Transnational Regulatory Networks and Their Limits, 34 YALE J. INT’L L. 113, 114 (2009) (finding that although numerous institutions began regulating international economic interactions, “economic regulation in crucial areas such as competition, securities, and banking remains first and foremost a domestic phenomenon”). 89 E.g., Robert W. Staiger & Alan O. Sykes, International Trade and Domestic Regulation 44 (Stan. U. Pub. L. & Legal Theory Research Paper Series, Paper No. 1504913, 2009), http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1504913 (illustrating how a country can regulate foreign actors who impose negative externalities on international markets by banning the importation of the foreign actor’s harmful product and shifting the foreign producer’s externalities from the domestic market). 90 See Gary B. Born, A Reappraisal of the Extraterritorial Reach of U.S. Law, 24 L. & POL’Y INT’L BUS. 1, 10–16 (1992) (discussing traditional notions of the extraterritorial application of national law, particularly in the context of the American notion of extraterritoriality). 568 GEORGIA LAW REVIEW [Vol. 50:547 risks. Second, a revolution in risk management practice and technology has characterized the most recent era in financial market innovation. Effective regulation of financial market participants or financial market intermediaries requires careful consideration of appropriate risk management technology. Risk management technology should occupy a central role in the development of any international regulatory approach. When financial institutions (whether conventional depository banking institutions, investment banks, or some type of lending syndicate) act as creditors, each carefully screens borrowers to ascertain their creditworthiness.91 Portfolio diversification, or the strategic allocation of credit risks across the spectrum of borrowers, offers another risk mitigation strategy.92 Finally, lenders require the payment of interest in connection with most lending arrangements; higher interest rates offset increased credit risk.93 These few examples of risks and risk mitigation strategies illustrate the challenges that financial institutions face in their efforts to execute business strategies. The list is not static. Financial institutions must continuously adapt to address emerging risks. Efforts to regulate systemic risk pose indisputably unique challenges. First, mitigating systemic risk requires properly identifying the sources of systemic risk. Second, regulation must be well-tailored to mitigate the threat of systemic risks. Finally, engineering effective regulation involves ensuring competent oversight and enforcement. III. EMERGING SYSTEMIC RISK CONCERNS: CYBERSECURITY THREATS While a well-identified body of risks, including credit, market, interest rate, and liquidity risk, has long been the subject of risk management experts, a new class of risk promises to test our most 91 SAUNDERS & CORNETT, supra note 38, at 579. 92 Id. 93 Id. at 578. 2016] MANAGING CYBER RISKS 571 executed by “gifted teenagers” who want to compromise international networks for the rush of successfully intruding in a proprietary space (fun) or for bragging rights (fame).102 “Lone wolf” attacks are some of the most “difficult cyberattacks to detect and combat.”103 Second are “hacktivists” attacks, which are conducted by individuals who are motivated to attack for political or moral reasons (furthering a cause).104 A third type of cyberattack involves “fraud and criminal activity,” usually executed by someone who wishes to gain access to customer information for their own advantage (fraud).105 These hackers tend to target banks and retailers due to the large amount of customer information they possess.106 A fourth type of cyberattack, known as “industrial espionage,” usually involves a lone wolf targeting financial assets (funneling funds).107 These attacks are often highly complex.108 “Cyber warfare,” a fifth type of cyberattack, describes a cyberattack against a nation state (furthering a military or political campaign).109 These are the least common of all cyberattacks, but could be the most destructive, even for the most developed countries.110 These definitional distinctions reflect different understandings of the elements of cyberattacks and the problems that these intrusions create. B. CYBER RISKS AND FINANCIAL INSTITUTIONS Who might initiate a cyberattack on a large, systemically important financial institution? Hackers (including activists who want to reveal weaknesses in cybersecurity risk management practices or disrupt a firm’s operations), foreigners engaged in 102 Id. 103 Id. 104 Id. 105 Id. 106 Id. 107 Id. 108 Id. 109 Id. 110 Id. 572 GEORGIA LAW REVIEW [Vol. 50:547 corporate or traditional espionage, and terrorists111 wreak havoc by penetrating firm firewalls, accessing confidential information, manipulating accounts,112 and disrupting key platforms in the international financial monetary system.113 Historically, cybersecurity policies have aimed to protect “investor and firm information from compromise,” meaning loss of data confidentiality, integrity, or availability.114 While data protection continues to be an important area of cyber risk concern, cyberattacks that threaten the networks that link financial institutions, exchange and clearinghouse platforms, and payment systems comprise the new cybersecurity frontier. Investment banks, broker-dealers, and securities and commodities exchange platforms strategically endeavor to anticipate and defend against cyberattacks. The Financial Industry Regulatory Authority (FINRA) reports that the “frequency and sophistication of these attacks is increasing and individual broker-dealers, and the industry as a whole, must make responding to these threats a high priority.”115 The cybersecurity concerns that financial institutions face threaten the stability of financial markets, the loss of billions of 111 FIN. INDUS. REGULATORY AUTH., REPORT ON CYBERSECURITY PRACTICES 1 (2015), http:// www.finra.org/sites/default/files/p602363%20Report%20on%20Cybersecurity%20Practices_0. pdf. 112 See id. (discussing the threat of “hackers penetrating systems for the purpose of account manipulation”). 113 See Katherine T. Smith et al., Case Studies of Cybercrime and Its Impact on Marketing Activity and Shareholder Value, 2011 ACAD. MKTG. STUD. J. (forthcoming), http://ssrn.com/a bstract=1724815 (“A challenge facing e-business or cyber-business is that it is vulnerable to e-crime, also called cybercrime. Cybercrime can totally disrupt a company’s marketing activities. Cybercrime costs publicly traded companies billions of dollars annually in stolen assets, lost business, and damaged reputations. Cybercrime costs the U.S. economy over $100 billion per year. Cash can be stolen, literally with the push of a button. If a company website goes down, customers will take their business elsewhere. In addition to the direct losses associated with cybercrime, a company that falls prey to cyber criminals may lose the confidence of customers who worry about the security of their business transactions. As a result, a company can lose future business if it is perceived to be vulnerable to cybercrime. Such vulnerability may even lead to a decrease in the market value of the company, due to legitimate concerns of financial analysts, investors, and creditors.” (internal citations omitted)). 114 FIN. INDUS. REGULATORY AUTH., supra note 111, at 3. 115 Id. 2016] MANAGING CYBER RISKS 573 dollars, and breaches of private data related to the banking, savings, and commercial accounts and wire-transfers or transactions of millions of clients, including businesses, governments, municipalities, non-profit organizations, and individuals. As the New York State Department of Financial Services noted, “[c]yber hacking is a potentially existential threat to our financial markets . . . .”116 Regulators note that cybersecurity threats may “wreak serious havoc on the financial lives of consumers.”117 Financial and banking institutions are thus concerned about both internal and external cyber security threats, and both internal and external infiltration testing is needed to determine how secure a firm is against these potential threats.118 These institutions naturally vary in how they rank various threats due to the nature of the firm and their business model.119 “For example, online brokerage firms and retail brokerages are more likely to rank the risk of hackers as their top priority risk” whereas “[f]irms that engage in algorithmic trading were more likely to rank insider risks more highly.”120 Similarly, large brokerage firms were more likely to rank “risks from nation states or hacktivist groups” higher than other firms.121 Technology plays a significant role in financial firms’ ability to execute transactions, intensifying financial institutions’ vulnerability to cyberattacks.122 Firms relying on the Internet to manage communications with clients; employees and clients’ accessing information on firm websites using mobile devices; and firms’ employees, clients, and regulators distributing information 116 Press Release, N.Y. Dep’t of Fin. Servs., NYDFS Issues Examination Guidance to Banks Outlining New Targeted Cyber Security Preparedness Assessments (Dec. 10, 2014), http://www.dfs.ny.gov/about/press/pr1412101.htm. 117 Id. 118 FIN. INDUS. REGULATORY AUTH., supra note 111, at 14, 22. 119 Id. at 5. 120 Id. 121 Id. 122 Id. at 1. 576 GEORGIA LAW REVIEW [Vol. 50:547 information. Proper internal control policies, common wisdom argues, will disarm attackers seeking to access firms’ confidential information. Risk assessments and information sharing can help these entities identify and prioritize the potential cyberattacks they could face and the steps they need to take to try to prevent these attacks,138 as well as measures for mitigation and containment for when a breach occurs.139 IV. REGULATING CYBERSPACE Charting a course for appropriately addressing cyber risks requires exploring a number of solutions. Examining these solutions reveals critical opportunities to mitigate endogenous cyber risks. This Part reveals that reliance on conventional solutions is a passive defense to cyberattacks. This Part demonstrates the necessity of dynamic strategies and collaboration among businesses and government. Cyberspace is governed by a patchwork of state, federal, and international regulations. Our fragmented regulatory framework, characterized by industry-specific legislation, leaves significant gaps in the oversight of cyberspace. No uniform international law currently exists to govern cyberspace and to specifically regulate cyberattacks, though entities including the United Nations, NATO, the Council of Europe, and the Shanghai Cooperation Organization have made some efforts to regulate cyberattacks.140 138 Id. 139 Id. at 24. 140 Hathaway et al., supra note 97, at 860 (“There has been only limited U.N. action on the issue of cyber-security. The U.N. General Assembly has passed several related resolutions. These resolutions, however, are vague and have not required any specific action by U.N. members.” (footnotes omitted)); id. at 861–62 (“NATO recently began to address the threat of cyber-attacks. NATO did little in response to the 2007 cyber-attack on Estonia, laying bare that it ‘lacked both coherent cyber doctrine and comprehensive cyber strategy.’ On the heels of that attack, NATO held its first meeting—the 2008 Bucharest Summit—to formally address cyber-attacks. This summit prompted the creation of two new NATO divisions focused on cyber-attacks: the Cyber Defence Management Authority and the Cooperative Cyber Defence Centre of Excellence.” (footnotes omitted)); id. at 862–63 (“The Council of Europe has taken the most direct and concrete approach to regulating a subset of the cyber-security problem—in particular, cyber-crime—of any international organization to date. As the first international treaty on crimes committed using the 2016] MANAGING CYBER RISKS 577 A. TOWARD TRANSPARENCY AND INFORMATION SHARING Congress has recently enacted or amended several significant cybersecurity regulations, including the Computer Fraud and Abuse Act,141 the E-Government Act of 2002,142 the Cybersecurity Research and Development Act of 2002,143 the Federal Information Security Management Act of 2002,144 the Cyber Security Enhancement Act of 2002,145 the Cybersecurity Enhancement Act of 2014,146 and the National Cybersecurity Protection Act of 2014.147 These legislative steps are laudable for their efforts to introduce criminal laws that address fraud involving devices, computers, or e-mail; malicious interference with communications lines, stations, or systems; electronic communication interception; illicit access to electronic communications and records; and recording of dialing, routing, addressing, and signaling information. Currently, no single piece of federal legislation exists that addresses cybersecurity threats and issues.148 The fragmented approach to addressing cyber risks creates opportunities for regulatory arbitrage. Moreover, none of these efforts effectively addresses mounting concerns that cyber risks Internet and other computer networks, the 2001 Council of Europe Convention on Cybercrime (‘Cybercrime Convention’) promulgated ‘a common criminal policy aimed at the protection of society against cybercrime,’ primarily through legislation and international cooperation. The United States ratified the Convention in 2006.” (footnotes omitted)); id. at 865 (“The Shanghai Cooperation Organization, an intergovernmental mutual security organization founded in 2001 by China, Kazakhstan, Kyrgyzstan, Russia, Tajikistan, and Uzbekistan, has taken significant preliminary steps toward cooperation in the cyber- security area. In its Yekaterinburg Declaration of June 16, 2009, ‘[t]he SCO member states stress[ed] the significance of the issue of ensuring international information security as one of the key elements of the common system of international security.’ The Organization presents a possible center of gravity in international legal action on cyber-attacks.” (alteration in original) (footnotes omitted)). 141 18 U.S.C. § 1030 (2012). 142 Pub. L. No. 107-347, 116 Stat. 2899. 143 Cyber Security Research and Development Act, Pub. L. No. 107-305, 116 Stat. 2367. 144 Pub. L. No. 107-347, § 301-05, 116 Stat. 2946, 2946–61. 145 Pub. L. No. 107-296, § 225, 116 Stat. 2156. 146 Pub. L. No. 113-274, 128 Stat. 2971. 147 Pub. L. No. 113-282, 128 Stat. 3066. 148 See Hathaway et al., supra note 97, at 877 (“U.S. domestic law, though potentially a powerful tool for battling cyber-attacks, has not yet addressed the challenge directly, and what remedies exist are in many cases restricted by jurisdictional limits.”). 578 GEORGIA LAW REVIEW [Vol. 50:547 may disrupt interconnected systems such as securities and commodities trading systems, banking systems, or payment systems. Leaving these systems vulnerable creates systemic risk concerns. The most recently minted statute in the litany of cyber regulations—the Cybersecurity Information Sharing Act of 2015 (CISA)149—demonstrates significant promise to address systemic cyber threats. Adopted on December 18, 2015, the CISA “[p]romotes and encourages the private sector and the United States government to rapidly and responsibly exchange cyber threat information.”150 Notwithstanding the promise of the CISA, concerns regarding the absence of privacy protections raise important questions regarding the implementation of the Act. 1. The Cybersecurity Information Sharing Act of 2015. The CISA aims to protect “information systems or information that is stored on, processed by, or transiting an information system . . . . The statute expressly declares its intent to protect information systems and information warehoused in these systems from cybersecurity threat attacks.”151 To this end, the statute creates a voluntary cybersecurity information sharing exchange designed to encourage public and private sector actors to share cyber threat information.152 The CISA invites private entities to gather and share relevant cybersecurity threat information with federal agencies or private entities without concerns that such acts violate antitrust regulations or create liability.153 Cybersecurity threats are defined in the statute as actions “that may result in an unauthorized effort to adversely impact the security, availability, confidentiality, or integrity of an information system or information that is stored on, processed by, or transiting an information system.”154 Title I— “Cybersecurity Information Sharing”—permits private entities to 149 H.R. 2029, 114th Cong., div. N, tit. I §§ 101–111 (2015) (enacted). 150 Cybersecurity Legislation Watch, ISACA, http://www.isaca.org/cyber/pages/cybersecuri tylegislation.aspx (last visited Feb. 10, 2016). 151 H.R. 2029, div. N, tit. I, § 102(4). 152 See generally id. tit. I (describing the new information sharing exchange). 153 See id. (setting up regulations to encourage information sharing). 154 Id. § 102(5)(A). 2016] MANAGING CYBER RISKS 581 information.165 Government warehousing of shared data is only as safe as the government’s capacity to prevent cyber intrusions. After recent cyberattacks breaching government agency defenses, many express concerns that shared information may be more vulnerable in the hands of government agencies. Privacy advocates’ concerns regarding secondary transfer of data may be one of the most hotly debated issues. Once information is shared with one agency of the federal government, the agency may transfer the shared information to the National Security Agency or the Federal Bureau of Investigation.166 With great alarm, critics of the bill proclaim that the bill allows extensive monitoring of web-based activities, empowers government officials and agencies to occupy a central role in gathering confidential and proprietary information, and creates too few limitations on law enforcement’s subsequent use of the information.167 These critics argue that the expansive definitions of “cyber threat indicator” and “cybersecurity threat” and the surveillance and liability protections afforded in the CISA give the government and private companies too much latitude in what types of information they gather and how they gather it.168 Others say the law is redundant of other information-sharing practices like 165 John D. McKinnon, Congress Poised to Pass Cybersecurity Measure, WALL ST. J. (Dec. 16, 2015), http://www.wsj.com/articles/congress-poised-to-pass-cybersecurity-measure-14502 84622; see also Press Release, Open Tech. Inst., Omnibus Funding Bill is a Privacy and Cybersecurity Failure (Dec. 16, 2015), https://www.newamerica.org/oti/omnibus-funding-bill- is-a-privacy-and-cybersecurity-failure/ (quoting Robyn Greene, Policy Counsel at New America’s Open Technology Institute, who said, “[t]he new, renamed version of CISA sets up a near free-for-all for the NSA and FBI to ramp up surveillance and investigation of Americans, and could seriously undermine data security and cybersecurity in general. If the excess of personal information that may be shared under this bill is targeted by malicious and nation state hackers—and there’s no reason to think it won’t be—this may well turn out to be the Intelligence Community’s next major boondoggle.”). 166 Press Release, Open Tech. Inst., supra note 165. 167 Letter from Civil Soc’y Orgs., to Member of Congress (Dec. 17, 2015), http://www.constitu tionproject.org/wp-content/uploads/2015/12/Coalition-Letter-Opposing-Cybersecurity-in-Omni bus.pdf. 168 Jessica Beyer, The Cybersecurity Information Sharing Act (CISA), HENRY M. JACKSON SCH. INT’L STUD., U. WASH. (Oct. 30, 2015), https://jsis.washington.edu/news/the-cybersecur ity-information-sharing-act-cisa/. 582 GEORGIA LAW REVIEW [Vol. 50:547 Information Sharing and Analysis Centers (ISACs) and the Department of Homeland Security’s Enhanced Cybersecurity Services.169 These critics argue that Congress and the Obama administration have not addressed if or why these other information-sharing practices are deficient.170 A few have even compared the CISA to the USA Patriot Act, stating that both laws are expensive that reflect legislative approaches with ideas that had previously been rejected by Congress and then quickly passed in a subsequent session before many would have had a chance to read through the entire bill.171 Important technology firms, including Google, Facebook, and Yahoo oppose various elements of the legislation and have expressed their intent not to participate in the information sharing program.172 Still others argue that the statue expands the power of the federal government in undesirable ways. For example, under Title I of the CISA, the Director of National Intelligence will lead the charge in developing “procedures to facilitate and promote . . . timely sharing of classified cyber threat indicators and defensive measures . . . and information relating to cybersecurity 169 Mark Jaycox & Lee Tien, Obama’s Computer Security Solution is a Mishmash of Old, Outdated Policy Solutions, ELECTRONIC FRONTIER FOUND. (Jan. 16, 2015), https://www.eff. org/deeplinks/2015/01/obamas-computer-security-solution-mish-mash-old-outdated-policy-solu tions. See, e.g., DEP’T OF HOMELAND SEC., Enhanced Cybersecurity Services, http://www.dhs. gov/sites/default/files/publications/ECS%20Fact%20Sheet%2007.30.15.pdf (last visited Feb. 22, 2016). 170 Jaycox & Tien, supra note 169. 171 Jenna McLaughlin, Hasty, Fearful Passage of Cybersecurity Bill Recalls Patriot Act, THE INTERCEPT (Dec. 19, 2015, 11:05 AM), https://theintercept.com/2015/12/19/hasty-fearfu l-passage-of-cybersecurity-bill-recalls-patriot-act/. 172 John D. McKinnon, Lawmakers, White House Near Cybersecurity Agreement, WALL ST. J. (Dec. 15, 2015, 5:39 PM), http://www.wsj.com/articles/lawmakers-white-house-near-cyber security-agreement-1450219168?cb=logged0.01276299450546503; see also Damian Paletta & Daisuke Wakabayashi, Apple Piles On as Senate Debates Cyber Bill, WALL ST. J. (Oct. 21, 2015, 11:46 AM), http://www.wsj.com/articles/apple-piles-on-as-senate-debates-cyber-bill-14 45442387 (reporting that Apple did not support the Cybersecurity Information Sharing Act and Apple’s statement, “[t]he trust of our customers means everything to us and we don’t believe security should come at the expense of their privacy”); Cory Bennett, Major Tech Group Comes Out Against Cyber Bill, THE HILL (Oct. 15, 2015, 12:34 PM), http://thehill. com/policy/cybersecurity/257029-major-tech-group-opposes-cyber-bill (listing Sprint, T- Mobile, Amazon, eBay, Netflix, Microsoft, Facebook, Google, Apple and Yahoo as opponents of the CISA). 2016] MANAGING CYBER RISKS 583 threats”173 with relevant federal entities,174 non-federal entities,175 or the public if appropriate.176 As critics have indicated, existing legislation grants the President broad powers in times of national emergency, which include the threat of a major cybersecurity incident.177 After the September 11th terrorist attacks, public concerns over executive power escalated with regard to the President’s authority to conduct surveillance within the United States,178 including President Bush’s controversial authorization enabling the NSA “to intercept international electronic communications between persons in the United States . . . .”179 The continuing expansion of executive and federal authority should be subject, these critics argue, to appropriate limitations. Finally, the defensive measures authorization provision in the CISA does not address measures that adversely impact third-party networks or data. Consistent with the congressional establishment of a voluntary sharing framework, the legislation disclaims any intention of creating a duty to share cyber threat indicators or defensive measures or a duty to warn or act based on the receipt of such indicators or measures.180 Congressional critics have already introduced a bill to repeal the CISA.181 B. ALTERNATIVE INITIATIVES While the CISA may mitigate certain cyber threats, voluntary information sharing alone will not overcome the possibility of 173 Cybersecurity Information Sharing Act of 2015, H.R. 2029, 114th Cong., div. N, tit. I, § 103(a)(1)–(2) (enacted). 174 See id. § 102(8) (defining Federal entity as “a department or agency of the United States or any component of such department or agency”). 175 See id. § 102(14)(A) (defining non-Federal entity as “any private entity, non-Federal government agency or department, or State, tribal, or local government (including a political subdivision, department, or component thereof)”). 176 Id. § 103(a). 177 David W. Opderbeck, Cybersecurity and Executive Power, 89 WASH. U. L. REV. 795, 813 (2012). 178 Id. at 822. 179 Id. at 826. 180 H.R. 2029, 114th Cong., div. N, tit. I, § 106(c)(1)(B). 181 H.R. 4350, 114th Cong. § 1 (2016). 586 GEORGIA LAW REVIEW [Vol. 50:547 Registrants should discuss possible outcomes and expected costs of potential cyber threats.195 If a cyber incident occurs, registrants must provide disclosure of losses that are reasonably possible and should aim to mitigate losses.196 Additionally, registrants are required to disclose their assessments of the effectiveness of their disclosures, controls and internal oversight procedures.197 The SEC’s reliance on transparency fails to offer a valuable tool for risk mitigation.198 Disclosure is an ex post declaration of events that have already transpired and offers limited guidance for firms seeking to prevent losses.199 Creating disclosure obligations may serve to alert the investing public to cyber risks.200 This approach also creates, however, challenges for registered companies seeking to raise capital from the investing public. Registered companies must determine when a cyber threat is sufficiently material to require disclosure.201 Certainly, the disclosure of every cyber risk is not useful to investors and simply serves to inundate markets with information.202 Determining the magnitude of the impact of evolving cyber threats, however, will prove challenging for firms. Evaluating disclosure regarding firms’ preparedness for cyberattacks will initially pose an industry-wide conundrum: 195 Id. 196 Id. 197 Id. 198 Cf. Joel Bronstein, The Balance Between Informing Investors and Protecting Companies: A Look at the Division of Corporate Finance’s Recent Guidelines on Cybersecurity Disclosure Requirements, 13 N.C. J.L. & TECH. ONLINE 257, 259 (2012) (noting that the guidelines force companies into a catch-22; they either expose themselves to further cyberattacks or risk failing to meet disclosure requirements). 199 See BLACK’S LAW DICTIONARY 497 (8th ed. 2004) (defining disclosure as “[t]he act or process of making known something that was previously unknown; a revaluation of facts”). 200 See Sam Young, Note, Contemplating Corporate Disclosure Obligations Arising From Cybersecurity Breaches, 38 J. CORP. L. 659, 663–64 (2013) (noting the potential impact that a cyberattack would “have on investors or potential investors in a public company”). 201 See Deloitte, CISOs Welcome SEC Cyber Security Disclosure Guidance But Struggle to Respond, C10 Journal, WALL ST. J. (Aug. 29, 2012, 12:01 AM), http://deloitte.wsj.com/cio/20 12/08/29/cisos-welcome-sec-cyber-security-disclosure-guidance-but-struggle-to-respond/ (“[C]ompanies are wondering what cyber risks they need to disclose and how they can disclose them without exposing their vulnerabilities and inviting cyber criminals to attack them.”). 202 See TSC Indus. v. Northway, Inc., 426 U.S. 438, 448–49 (1976) (noting that disclosure of too much information could, if “trivial information,” “bury” investors and prevent informed decisionmaking). 2016] MANAGING CYBER RISKS 587 Disclosing too little information creates liability risks but disclosing too much damages capital raising efforts.203 Finally, a public-private initiative may represent the most valuable path toward cyber risk mitigation.204 In February 2013, President Barack Obama signed an Executive Order authorizing NIST to develop a Framework for Improving Critical Infrastructure Cybersecurity to address cyber risks.205 Similar to FINRA’s best practices, the NIST framework is not mandatory, though, many have enthusiastically embraced the guidelines as the appropriate standard for financial markets. The framework is designed specifically to protect critical infrastructure, or resources that provide vital national, physical, or virtual systems and assets whose destruction “would have a debilitating impact on cybersecurity, national economic security, national public health or safety, or any combination of those matters.”206 The framework consists of three parts—the Framework Core, the Framework 203 See Roland L. Trope & Sara Jane Hughes, The SEC Staff’s “Cybersecurity Disclosure” Guidance: Will It Help Investors or Cyber-thieves More?, BUS. L. TODAY, Dec. 2011, at 4, http:// http://www.americanbar.org/content/dam/aba/publications/blt/2011/12/sec-cybersecurity-2011 12.authcheckdam.pdf (explaining the Hobbesian choice created by the SEC’s guidance; businesses will either discuss too little or too much). 204 See INTELLIGENCE & NAT’L SEC. ALLIANCE, ADDRESSING CYBER-SECURITY THROUGH PUBLIC PRIVATE PARTNERSHIP: AN ANALYSIS OF EXISTING MODELS 3 (2009) (“Since the nation’s cyber infrastructure is not government owned, a partnership of government, corporate and private stakeholders is required to secure the internet.”). 205 See Sari Greene, Cybersecurity is an Executive Responsibility: Preparing for Upcoming Cybersecurity Examinations, MAINE BANKER, Mar.–Apr. 2015, at 5, http://learn.sagedatasecur ity.com/hubfs/docs/cybersecurity-is-an-executive-responsibility.pdf?t= 1443532531801 (“While not mandatory, there is an expectation that financial institutions will adopt the NIST Cybersecurity Framework as a way to measure cybersecurity readiness and resilience, as well as to create a cybersecurity roadmap.”); Paul A. Ferrillo, Understanding and Implementing the NIST Cybersecurity Framework, HARV. L. SCH. F. ON CORP. GOVERNANCE & FIN. REGULATION (Aug. 25, 2014), http://corpgov.law.harvard.edu/2014/08/25/understanding-and-implementing- the-nist-cybersecurity-framework/ (quoting Graham Scott, Interview: Greg Touhill, DHS, USA on Cybersecurity, GLOBAL GOV’T FORUM (July 28, 2014), http://www.globalgovernentforum. com/brigadier-general-greg-touhill-cybersecurity-department-of-homeland-security-interview/ (“Though ‘voluntary,’ it cannot be overstated that the [NIST] Framework is ‘a National Standard’ developed with input from industry experts, collaborators and businesses with years of cyber experience.”)). 206 NAT’L INST. OF SCI. AND TECH., FRAMEWORK FOR IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY 37 (2014), http://www.nist.gov/cyberframework/upload/cybersecurity-frame work-021214.pdf. 588 GEORGIA LAW REVIEW [Vol. 50:547 Profile, and the Framework Implementation Tiers—and “focuses on using business drivers to guide cybersecurity activities and considering cybersecurity risks as part of the organization’s risk management processes.”207 Similar to FINRA’s guidelines,208 this framework is not a one-size-fits-all approach for managing cyber threats.209 Firms will vary in implementing the framework depending on their unique threats and vulnerabilities.210 The Framework Core provides industry standards, guidelines, and practices for cybersecurity activities and desired outcomes for all levels within a company by using five key functions: identify, protect, detect, respond, and recover.211 Identify refers to developing a procedure to identify and manage cyber threats.212 Protect refers to ensuring delivery of critical infrastructure services.213 Detect refers to promptly identifying that a cybersecurity incident has occurred.214 Respond refers to taking action after detecting a cybersecurity incident.215 Recover refers to resilience and restoring capabilities or services that were harmed because of a cybersecurity incident.216 The NIST framework Profile applies the Framework Core to a particular scenario in order to reach outcomes based on business needs that a company has selected from the framework categories and subcategories.217 Companies should have a Current Profile (showing the cybersecurity outcomes the company is currently achieving) and a Target Profile (showing the desired cybersecurity risk management goals and outcomes).218 Comparing these two profiles can help identify gaps in a company’s cybersecurity risk management procedures and thus help the company to close those 207 Id. at 1. 208 See supra notes 186–89 and accompanying text. 209 NAT’L INST. OF SCI. AND TECH., supra note 206, at 2. 210 Id. 211 Id. at 4. 212 Id. at 8. 213 Id. 214 Id. 215 Id. at 8–9. 216 Id. at 9. 217 Id. at 5. 218 Id. at 11. 2016] MANAGING CYBER RISKS 591 V. CONCLUSION Cyberattacks are a central, pervasive, and endemic threat, which will grow exponentially in coming years.236 As President Obama observed, cyberattacks threaten to “sabotage our power grid, our financial institutions, and our air traffic control systems.”237 These information structures “serve as the backbone of our national economy.”238 Simply stated, we must acknowledge the critical natures of cyber risks and the threat such risks impose on “economic value creation, exchange, and transfer.”239 This Essay questions the existing emphasis on risk management solutions that focus on information and agency failures. Over the last four decades, parallel to the development and increasing sophistication of regulation and financial market engineering, risk management strategies have evolved. Traditional risk management solutions have relied on independently developed, implemented, and enforced risk management practices. This Essay dismisses the conventional approaches to risk management in international financial markets. Rather than focusing on solutions applicable to individual risk management issues, this Essay surveys solutions to identify strengths and limitations of existing regulatory options 236 Martin Giles, Defending the Digital Frontier, ECONOMIST (July 12, 2014), http://www. economist.com/news/special-report/21606416-companies-markets-andcountires-are-increasi ngly under attack-cyber-criminals (“Data breaches are becoming ever bigger and more common. Last year over 800 [million] records were lost, mainly through such attacks . . . . Among the most prominent recent victims has been Target, whose chief executive, Gregg Steinhafel, stood down from his job in May, a few months after the giant American retailer revealed that online intruders had stolen millions of digital records about its customers, including credit- and debit-card details. Other well-known firms such as Adobe, a tech company, and eBay, an online marketplace, have also been hit.”); see also FIN. INDUS. REGULATORY AUTH., supra note 111, at 38 (encouraging businesses to recognize and combat growing cybersecurity threats). 237 Barack Obama, President of the United States, Remarks by the President in the State of the Union Address (Feb. 12, 2013). 238 Yogesh Malhotra, Risk, Uncertainty, and, Profit for the Cyber Era: Model Risk Management of Cyber Insurance Models Using Quantitative Finance and Advanced Analytics 12 (Jan. 2015) (unpublished thesis, State University of New York), http://papers. ssrn.com/sol3/papers.cfm?abstract_id=2553547. 239 Id. at 1–12. 592 GEORGIA LAW REVIEW [Vol. 50:547 and emphasizes developing a comprehensive understanding of cyber risks and cyber risk management.
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved