BEBA: Cyber Security, Insurance as Springboard for Successful Digital Transformation

by Marwa Mostafa

On Monday, the British Egyptian Business Association (BEBA) organized a breakfast briefing on Cyber Security: How to Mitigate the Growing Digital Risks and Hazards. Four high-profile experts participated in the briefing, namely Mr. Mohamed Moustafa Abdelrasool, CEO and Managing Director of Orient Insurance; Dr. Ahmed Ali Abdel-Hafez, Vice President of Cyber Security Affairs at the National Telecom Regulatory Authority (NTRA); Mr. Walif Auf, Vice Chairman at Medmark Insurance Brokerage; Mr. Thomas Cook, Regional Associate Director of Cyber Middle East and African at Howden Insurance Brokers; Eng. Samah Khamis, Head of Cyber Security and Tech Strategy at Vodafone Egypt; Mr. Omar Shawki, Partner at Mazars in Egypt -Mostafa Shawki, was moderated by Karim Refaat, CEO and Chairman of N Gag Consulting.

Dr. Ahmed Ali Abdel-Hafez started the talk by saying that the Egyptian government established in 2014 the Egyptian Supreme Cybersecurity Council (ESCC) with a committee tasked with monitoring cyberspace and developing a national strategy to face and respond to cyber threats and attacks and oversee its implementation and update. The council’s establishment began a new era for all security agencies and all crucial infrastructure in the country.

He further elaborated that the ESCC’s objective is to bolster strategies and frameworks to safeguard all governmental digital assets, emphasizing the importance of asset protection during this transformation. 

This has led to a comprehensive overhaul of the communication system in the country and eventually drawing up a comprehensive five-year cybersecurity strategy from 2023 to 2027, he added. 

Moreover, Dr. Abdel-Hafez highlighted that the NTRA fosters numerous innovations, enhances intelligence, and improves analysis. The NTRA is proactively working with various meta-sectors to ensure their protection. He noted that if any superior hybrid solutions are identified for any critical government infrastructure, it is tasked with managing them. 

The NTRA official further said that cybersecurity is often considered a standalone field. However, the NTRA is planning to foster collaborations both nationally and globally.

He further stated that countries worldwide are striving to enhance their cybersecurity capabilities. He pointed out that there are over four million job openings in cybersecurity. Therefore, capacity building is crucial to equip individuals with the skills needed to work in this sector. Dr. Abdel-Hafez described cybersecurity as a triad of technology, processes, and people’s ability to adapt to the technology. 

He also mentioned that a significant percentage – 80 to 90 percent of incidents result from a need for more awareness. The first step to address this issue is through academia and how it can be leveraged effectively.

Meanwhile, Mr. Omar Shawki expressed that vision transformation is a significant topic he aims to address in the broader society.

He acknowledged that his company works extensively with businesses, often assessing their controls and risks. One of the major threats the company identified is the insider threat. He emphasized the importance of discussing this issue, noting that the broader context of the country is not the only concern.

He also mentioned that the COVID-19 pandemic has accelerated this transformation. He observed that government aspirations are also a part of this changing landscape.

Mr. Shawki further discussed the challenges of managing and mitigating new software and hardware risks. 

He highlighted the example of electronic invoicing, which now involves nearly half a million companies on their platform. He added that this digital transformation, especially for those who may have yet to digitize their processes, presents significant risks in managing their software and hardware. 

He also mentioned the potential of smart devices and how Mazars-Mostafa Shawki assists their clients. The company has established processes to help organizations implement appropriate cyber-risk mitigation measures. 

He brought up the concept of cyber insurance, which is increasingly offered these days, noting that his company is seeing a surge in tenders and client engagements.

He mentioned that clients are often asked if they have cyber insurance. This is a method for clients to safeguard themselves from potential damage. He explained that clients might implement processes and procedures that cyber insurance companies favor, as these measures can provide protection in the long run.

For his part, Mr. Thomas Cook explained that the topic of cyber insurance is multifaceted. The first question he usually encounters is about the post-incident costs. When evaluating cyber insurance, three key elements are typically considered:

Revenue: This is considered because it relates to the business and interaction costs associated with a cyber insurance policy. It’s also used to calculate the aggregate costs of a ransomware claim.

Personal Identity Information: The cost of restoring an individual’s personal identity information is another crucial factor.

Controls: Lastly, they consider the other controls that are in place.

Mr. Cook added that these elements help assess the scope and coverage of a cyber insurance policy. 

He added that while financial institutions primarily sought cyber insurance about five years ago, it has become essential across a broad spectrum of sectors.

Cybersecurity insurance is witnessing its adoption by retailers, manufacturing companies, and Asian firms. When considering the media sector, Mr. Cook noted a noticeable increase in the content posted at the start of the tank. 

Mr. Cook further explained that when it comes to European companies involved in the sale of duty fuel, a significant amount of information is being posted online across various new categories. However, they have noticed that even when this occurs, it is only sometimes promptly notified in the app.

When examining companies regarding actual cybersecurity, he reiterated that it is not just about the incidents but also the optimizations. They typically advise their clients to identify the potential risks they might face and the measures they would take to mitigate such exposure.

Thomas Cook further explained that one of Howden’s clients experienced a cybersecurity attack about two years ago. As part of the company’s cyber insurance, clients receive a policy document with a post-incident manager who can assist during such events.

However, if all their documents were stored online and a cybersecurity attack occurred, resulting in network encryption, they could not access or print their documents, which could aid them.

Therefore, if their security controls are compromised due to a cybersecurity attack, it is crucial to have plans to navigate the attacks and minimize the cost of such incidents. This approach is of utmost importance, he said.

Meanwhile, Mr. Walid Auf stated that crime insurance is a significant area within the insurance industry.

To understand this better, Mr. Auf said it is crucial to delve into the psychology and dynamics of crimes. Three factors primarily drive crimes. The first is motivation, which is critical because every criminal is aware that they are violating the law and could face severe consequences.

Therefore, he explained that the incentive to break the law must be substantial. Motivation is thus a key factor. The second factor is that most criminals view themselves as intelligent individuals who can commit crimes and evade punishment.

He further explained that the second factor is that most criminals see themselves as clever strategists who can execute their crimes and escape punishment.

This also involves the perception of the other’s capacity or the criminal to whom all actions are attributed. The third factor is the perceived vulnerability of the victim. The more vulnerable the victim appears, the greater the desire to commit a crime against them. Looking at the first factor, motivation, it is clear that the primary driving force for most criminals is money, Mr. Auf noted. 

He continued to explain that money has been transitioning from physical establishments to online and digital platforms over the years. The allure of the digital realm is growing daily. Mr. Auf mentioned an intriguing piece of information he came across just before the weekend: the S&P 500 IT index reached an all-time high. This indicates the increasing amount of money in the digital world, which is expected to continue.

Regarding the capabilities of hackers, Mr. Auf said they possess the same skill set as developers. They are developers. When launching a website or any application, the developers who create it also test it against hacking. Thus, those who develop technology have the same skills as those who hack it.

He also mentioned terrorist training camps, which can sometimes resemble state security force training camps in terms of the skills and capacities they possess. This suggests a growing capacity in that area. 

Mr. Auf emphasized that the third factor, particularly relevant in developing markets, is the victim’s vulnerability.

The need for more awareness among individuals or within organizations increases their exposure to successful attacks. Given that attacks are becoming increasingly frequent, it would be beneficial if cybersecurity colleagues could provide insights into the evolving success rates of these attacks. 

He continued, acknowledging the fluctuating state of improvement or deterioration, though Mr. Auf admitted he was not entirely sure about it. However, he emphasized its importance. “Given the interplay of these factors, we’re witnessing increased attacks.”

For Egypt, Mr. Auf believes Egypt is still at the beginning stages in terms of awareness. “There is a significant amount of work to be done by us as cybersecurity experts, the state, market players, and cyber insurance specialists. We all have a role in enhancing this awareness, and there’s still a long journey ahead.” 

He suggested that this might seem evident to him, but if more intellectually strategic and innovative individuals wanted to learn, he would welcome it.  

For his part, Mr. Mohamed Moustafa Abdelrasool added to Mr. Auf’s points about the three causes of cyber-attacks. 

He suggested that they haven’t tried to educate their existing and potential clients about cyber insurance. Many people are unaware of the existence of cyber insurance.

Secondly, when clients or potential clients consider cyber insurance, they often perceive it as very costly, which is different, he added. In fact, for a large corporate client, the cost of cyber insurance is less than what they would pay for property or fire insurance for their factory.

Mr. Abdelrasool further emphasized the importance of ensuring that they obtain full-time degrees. This is crucial. However, as Mr. Cook pointed out, it is all based on information. “The more information you provide us, the better your premium will be.” 

Mr. Abdelrasool mentioned that the legal costs linked to all marketing activities, including Facebook pages, Instagram, websites, and other marketing efforts, are covered. He gave an example of a cyber-attack occurring, and the hacker takes control of the website and Facebook page, using them to attack or offend our competitors. If our competitors were to file a legal case against us due to this, the associated legal expenses would be covered. 

He further stated: “Perhaps it’s the inherent risk; it’s cautious; it’s not a doubt; but we have a solution. Another important aspect we cover is reputation. In the event of an overt attack, the repetition is significantly better.”

A public relations firm may need to be hired to restore its reputation. “When a company’s reputation is impacted, it can take years to rebuild, so we also cover this. Interestingly, we are very discreet, making it a better deal.”

“A cyber-attack can disrupt business operations, either partially or fully. So, we cover your profit and operating expenses associated with your business’s partial or full shutdown until you regain your normal operations.” 

Mr. Abdelrasool elaborated that cyber insurance is similar to other types of insurance and offers various coverage options. His company advises customers on the value chain of insurance and the importance of cyber insurance. A broker guides customers on what to purchase based on the policy’s minimum liability coverage. They pay up to a specific limit; any amount below this is the customer’s responsibility.

They work closely with customers, advising them on risk management and providing training tips, as education is crucial in this field. He added that they emphasize the importance of being cautious with messages and emails to prevent data leaks. 

He highlighted that not only large businesses are targeted by cyber-attacks but also small and medium-sized enterprises (SMEs), which account for 50 percent of cyber-attacks globally. Therefore, businesses of all sizes need to be prepared for potential attacks. 

Moreover, Mr. Abdelrasool also noted that not all hackers are professionals; some do it for fun or to prove themselves. Many hackers have psychological issues, and their motivations aren’t solely about money. They seek to demonstrate their ability to dominate and control.

On the other hand, Eng. Samah Khamis emphasized that technology companies need to acknowledge security as a priority. By recognizing this, they can develop strategies and make the necessary investments. Since 2017, Vodafone Egypt has been working on securing technology and services. The shift to digital has increased tax rates and the use of online services. Vodafone Egypt has tools to protect online transactions and understands that building this strategy is a continuous journey.

“Every organization must recognize the tangible threat of cyber risks and establish a robust cybersecurity strategy, reinforced by tools, resources, and a skilled workforce.” Eng. Khamis said. 

She added that building secure systems is a continuous journey, not a quick fix. There is a global need for more security experts—however, Eng. Khamis is hopeful as more educational institutions are introducing cybersecurity and AI programs. She believes organizations are now prioritizing cybersecurity and implementing appropriate policies and strategies. She advises customers to consider the security measures of their service providers, especially in the digital world, to ensure the safety of their transactions and personal information.

She further stated that half of the attacks originate within the organization itself. “Therefore, it is not just about implementing the right tools, systems, and policies, but also about raising awareness among your people about the importance of using strong passwords.”

Mr. Karim Refaat concluded the panel by saying: “Empower organizations by boosting awareness of cyber threats and implementing strong cybersecurity strategies. Collaborate with insurance brokers, enhance education, and leverage innovation. In our digital era, acquiring international expertise is crucial to manage associated risks effectively.”  

You may also like

Leave a Comment

Subscribe Now To Get Our Latest News

Top 50 Women Forum is the first platform in Egypt to work exclusively on empowering women professionals, with the purpose of strengthening their contribution development & decision-making processes.

Top 50 Women Forum is the first platform in Egypt to work exclusively on empowering women professionals, with the purpose of strengthening their contribution development & decision-making processes.

©2024 COPYRIGHTS BY EXLNT COMMUNICATIONS All Rights Reserved.