Asking the right questions within your organization is key to effectively managing cyber risk. Here are 10 questions that you should ask your team: 
1. What information and systems do we care about and why? 
    - What information do we have that we care about? (personal information of employees or customers; proprietary information (trade secrets); third-party confidential information)
 
    - What systems are critical for our continued operation?
 
2. What are the risk scenarios that create exposure for us based on answers to #1?
    - Internal risk (e.g. malicious or error)
 
    - External attack (e.g. phishing; brute force)
 
    - Supplier/third party issue (e.g. victim of attack or error)
 
3. What measures do we have in place to manage third party risk?
    - Contractual provisions? (e.g. restrictions on use/retention of information; obligation to safeguard and implement specific security measures on issues such as backup storage; notification in event of suspected/confirmed incident; obligations in event of incident (investigate/share information); right to audit; optional provisions: third party security certification; obligation to have insurance)
 
4. What regulatory obligations do we have in relation to cyber?
    - Do we have defensible documentation to establish compliance with our obligations?
 
5. What is the estimated financial exposure from the risk scenarios materializing?
    - Do we have exposure from: unauthorized access, lack of integrity, inability to access?
 
    - What is the dollar value for every day of business interruption, loss of goodwill?
 
    - What are the potential claims by data subjects (how many data subjects; categories of information/sensitivity; should we even have this information)?
 
    - What are the breach of contract consequences?
 
6. What technical tools do we have in place and how do they protect against risk scenarios?
    - What are we using as our benchmark and why is that relevant baseline?
 
    - Are we up to date with newest threat actor tactics?  
 
    - How will we know if there is unauthorized access to our network? Does someone get an alert if there is unusual activity?  
 
    - How do we define scope of what is ‘unusual’? (e.g., connection from unusual location; connection from two different locations)
 
    - If intruder gains access, how easily can they move around without being detected? How have we protected most sensitive information?
 
    - Have we configured all tools to maximize security and create exceptions where necessary for business objectives (e.g., firewall only permits certain inbound/outbound connections)?
 
    - Can we impose restrictions to limit risk? (e.g., multi-factor authentication always required; password restrictions; restrict ability of users to install software; encryption; limit ability to download)?
 
7. How could a risk scenario materialize notwithstanding all technical tools in place?
    - Have we considered the role of the following in giving rise to risk scenarios: human error; third party/supplier issue?
 
8. What policies and protocols do we need in place to manage risk scenarios?
    - Do we have appropriate governance in place to manage these risks? (e.g. applicant vetting; employee training; outsourcing; rules around use of personal devices; patching; data retention; review and updating of security strategy; escalation of security observations/concerns)?
 
9. In what ways are we prepared for an attack?
    - Do we have reliable and tested backups?  How current?
 
    - Are we collecting and preserving logs? 
 
    - Is our defensible documentation in place?
 
    - Have we tested our preparedness through tabletop exercises and incorporate learnings into strategy
 
    - Do we have the right experts on speed dial?
 
10. Are we accessing all available external resources?
    - Have we looked at available resources such as the Canadian Centre for Cyber Security or industry groups for information sharing and coordination?
 
    - Have we consulted experts about our preparedness strategy?
 
If you have questions about cybersecurity risk management, reach out to Bennett Jones' Data Governance Protection and Cybersecurity team.