Cyber incidents are becoming more sophisticated and their costs difficult to quantify. Using a unique database of cyber events across sectors in the US, we document the characteristics and drivers of cyber incidents. Cyber costs are higher for larger firms and for incidents that impact several organisations simultaneously. Events with malicious intent (i.e. cyber attacks) tend to be less costly, unless they are on the upper tail of the loss distribution. The financial sector is exposed to a larger number of cyber attacks but suffers lower costs, on average. The use of cloud services is associated with lower costs, especially when cyber incidents are relatively small. As cloud providers become systemically important, cloud dependence is like...
This research, conducted under the EIC Program at IRT-SystemX1, concerns the conditions needed for k...
With increased digitalization and a larger internet presence, cybercrime has become more frequent in...
Severe security breaches can be costly for publicly listed firms. In order to deploy scarce resource...
Cyber incidents are becoming more sophisticated and their costs difficult to quantify. Using a uniqu...
Since the beginning of the 21st century Cyber attacks have become increasingly prevalent. In the fir...
With a continuously changing threat landscape, companies must be prepared for the most unforeseen cy...
We construct novel text-based measures of firm-level cyber risk exposure based on quarterly earnings...
As modern society becomes ever more dependenton IT services, risk management of cyber incidents beco...
There is not a uniform view of the link between cyber risk and systemic risk: some assume a direct l...
Cybercrime directs to any criminal activity taken out utilizing computers or the internet. Attackers...
In recent decades, Information and Communication Technologies (ICT) have significantly evolved, furt...
Cyber-attacks can significantly hurt an organization’s IT environment, leading to se-rious operation...
Over the last decade, cybersecurity threats have drastically increased in scale, impact and frequenc...
Throughout the recent years cloud computing has gained large popularity in the information technolog...
The dependence on cyberspace has considerably increased over time, as such, people look at risk asso...
This research, conducted under the EIC Program at IRT-SystemX1, concerns the conditions needed for k...
With increased digitalization and a larger internet presence, cybercrime has become more frequent in...
Severe security breaches can be costly for publicly listed firms. In order to deploy scarce resource...
Cyber incidents are becoming more sophisticated and their costs difficult to quantify. Using a uniqu...
Since the beginning of the 21st century Cyber attacks have become increasingly prevalent. In the fir...
With a continuously changing threat landscape, companies must be prepared for the most unforeseen cy...
We construct novel text-based measures of firm-level cyber risk exposure based on quarterly earnings...
As modern society becomes ever more dependenton IT services, risk management of cyber incidents beco...
There is not a uniform view of the link between cyber risk and systemic risk: some assume a direct l...
Cybercrime directs to any criminal activity taken out utilizing computers or the internet. Attackers...
In recent decades, Information and Communication Technologies (ICT) have significantly evolved, furt...
Cyber-attacks can significantly hurt an organization’s IT environment, leading to se-rious operation...
Over the last decade, cybersecurity threats have drastically increased in scale, impact and frequenc...
Throughout the recent years cloud computing has gained large popularity in the information technolog...
The dependence on cyberspace has considerably increased over time, as such, people look at risk asso...
This research, conducted under the EIC Program at IRT-SystemX1, concerns the conditions needed for k...
With increased digitalization and a larger internet presence, cybercrime has become more frequent in...
Severe security breaches can be costly for publicly listed firms. In order to deploy scarce resource...