248
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Cyber risk modeling: a discrete multivariate count process approach

, &
Pages 625-655 | Received 01 Feb 2023, Accepted 26 Nov 2023, Published online: 02 Jan 2024
 

Abstract

In the past decade, cyber risk has raised much interest in the economy, and cyber risk has evolved from a type of pure operational risk to both operational and liability risk. However, the modeling of cyber risk is still in its infancy. Compared with other financial risks, cyber risk has some unique features. In particular, discrete variables regularly arise both in the frequency component (e.g. number of events per unit time), and the severity component (e.g. the number of data breaches for each cyber event). In addition, the modeling of these count variables are further complicated by nonstandard properties such as zero inflation, serial and cross-sectional correlations, as well as heavy tails. Previous cyber risk models have largely focused on continuous models that are incompatible with many of these characteristics. This paper introduces a new count-based frequency-severity framework to model cyber risk, with a dynamic multivariate negative binomial autoregressive process for the frequency component, and the generalized Poisson inverse-Gaussian distribution for the severity component. We unify these new modeling tools by proposing a tractable Generalized Method of Moments for their estimation and applying them to the Privacy Rights Clearinghouse (PRC) dataset.

JEL classifications:

Acknowledgments

The authors acknowledge helpful comments and suggestions from Editor Mogens Steffensen and an anonymous referee.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Notes

1 Currently, there is no consensual definition of cyber risk in the insurance sector. However, a few associations of insurance companies have put forward some definitions. For example, the Geneva Association (Citation2016) defined cyber risk as ‘any risk emerging from the use of information and communication technology that compromises the confidentiality, availability, or integrity of data or services.’ Similarly, Cebula & Young (Citation2010) define cyber risk as ‘operational risks to information and technology assets that have consequences affecting the confidentiality, availability or integrity of information or information systems’.

2 Traditionally, operational risk is assumed to be either uncorrelated, or negative correlated with other risks (Gatzert & Kolb Citation2014).

3 A recent literature introduces network-based (Fahrenwaldt et al. Citation2018, Jevtić & Lanchier Citation2020) or epidemiology-based (Xu & Hua Citation2019, Hillairet & Lopez Citation2021) frequency models. Even though these models have appealing theoretical properties, they are not suitable for currently available cyber risk databases. As Hillairet & Lopez (Citation2021) put it, ‘Using the model to replicate the attack is a difficult task, since few available data support the calibration of the parameters.’ As a consequence, the illustration of these models have been largely confined to simulation studies.

4 The Privacy Rights Clearinghouse database is made publicly available at https://privacyrights.org/data-breaches. This article is based on a download on 2/27/2021, covering events between 2005 and 2019.

5 Eling & Jung (Citation2018) also suggest a categorization according to organization types. Our empirical analysis in Section 5 will focus on classification according to breach types due to length restriction. We find consistent results across different organization types, and we collect the estimation results for organization types in Appendix 3.

6 The weekly frequency has also been adopted by Jung (Citation2021). By using weekly counts, we obtain a much longer time series, which hugely facilitates the parameter estimation of our model. Similarly, higher-frequency count data have also been analyzed in the cyber risk literature by, e.g. Xu et al. (Citation2017) and Peng et al. (Citation2017). Other choices of frequencies include bi-weekly (Jung Citation2021), monthly (Wheatley et al. Citation2016, Eling & Jung Citation2018, Eling & Wirfs Citation2019, Xu & Zhang Citation2021), bi-annually (Wheatley et al. Citation2021), and yearly (Wheatley et al. Citation2016).

7 Depending on the applications, this unit might be one year, in the case of computation of Value-at-Risk for a bank (Chavez-Demoulin et al. Citation2005Citation2016), or one hour (Peng et al. Citation2017).

8 Bessy-Roland et al. (Citation2021) show that the computation of the unconditional expectation of the process involves matrix equations of dimension K(K+1)×K(K+1), where K is the dimension of the Hawkes process. The conditional expectation given observation up to a certain time t has not been derived.

9 Some of the commercial databases, such as SAS OpRisk Global data (e.g. Eling & Wirfs Citation2019, Eling & Schnell Citation2020), or IBM's annual Cost of Data Breach Report (Eling & Jung Citation2018), also provide the monetary cost of these cyber events. However, these datasets are not publicly available and most existing cyber risk studies rely on data that provide integer-valued severity variables. See also Section 6 and Appendix 2 for further discussion.

10 According to the RMS-CCRS review, 46% of the reviewed policies included coverage for reputation damage (RMS-CCRS Citation2016).

11 For instance, on 9/13/2016, the World Anti-Doping Agency (WADA) confirmed the hack of its database on medical files of Olympic athletes by the Russian group Fancy Bear. This event led to only 4 lost records, but its economic consequence could be difficult to evaluate, yet potentially large, especially if the stolen information was used by rival athletes.

12 Trend in cyber data has been discussed in the literature. For example, Edwards et al. (Citation2016) report no time trend for the severity over the past decade. Eling & Loperfido (Citation2017) report no clear upward or downward trend in the PRC data from 10 January 2005 to 15 December 2015. According to Eling & Jung (Citation2018), they empirically do not observe any non-stationarity or serial dependence for different risk types. Jung (Citation2021) reports a break in loss severity trend using 50 days rolling windows.

13 For instance, if we were to count the cyber events in PRC by organization types as in Eling & Jung (Citation2018), then we get K = 5. These results are collected in Appendix 3.

14 Under some conditions, the domain of δ0 can be further relaxed, see Denuit & Lu (Citation2021) for a discussion.

15 Even though the covariance formula (Equation2) does not depend on the sign of the entries Σ, the off-diagonal elements of Σ should not be constrained to be nonnegative. Indeed, the distribution of X is not multivariate normal, hence it is not fully-characterized by its first two moments.

16 This latter involves quadratic forms of bivariate Wishart stochastic matrices. The problem with this specification is that at dimension K, each such quadratic form involves K(K+1)/2 parameters, and there are as many quadratic forms as there are components of Yt. In contrast, our new model only involves the Wishart-gamma distribution, which is the diagonal of the Wishart distribution and is hence much more parsimonious.

17 The effect of self-excitation is captured by parameters βj,j,j=1,,K.

18 The effect of mutual-excitation is captured by parameters βi,j,ij.

19 Note that the term ‘systemic contagion’ does not necessarily mean that one systemic event generates simultaneously cyber events of different types. This terminology is mainly introduced to emphasize the fact that in contrast to self-excitation which generates counts that are conditionally independent given the past, the systemic channel, through the common factor Xt, captures the positive correlation of Y1,t+1,,YK,t+1 given past information.

20 See Chavez-Demoulin et al. (Citation2016) for a similar, deterministic approach for the modeling of operational risk.

21 We say that process (Yt) is strictly stationary, if any finite dimensional marginal distribution of (Yt+k1,Yt+k2,,Yt+kn), where n,k1,,kn are integers, are time-invariant.

22 See also El-Shaarawi et al. (Citation2011) for an application in environmental sciences.

23 See Zhu & Joe (Citation2009) for the interpretation of these three parameters in terms of shape, scale, and probability, respectively.

24 Recently, Sun et al. (Citation2020) investigate the dependence between the severity and frequency at the firm-level and found a nonlinear, positive dependence. However, their analysis is based on firms that have reported claims only, and is hence subject to selection bias. Moreover, their approach does not allow for serial correlation, and cannot be applied at the portfolio level. Because events are disaggregated into different breach categories, some of the heterogeneity has already been taken into account. As a consequence, the independence assumption between frequency and severity for each of the event types seems reasonable.

25 Zhu & Joe (Citation2009) propose an alternative recursive formula to compute the pmf, but the computational cost of this recursion is still very high for large n and it is known that such recursion may have large numerical error (Wang & Panjer Citation1993).

26 Note, however, that it is possible to compute the conditional pmf of a multivariate count process by series expansion, if the conditional pgf is available in closed form. See Lu (Citation2021) for a treatment of the univariate case, and Darolles et al. (Citation2019) for an example in dimension K = 2. The disadvantage of this approach is that the computation becomes much more costly in high dimensions, say K = 4, even though one could rely on pairwise conditional pgf p(Yt,i,Yt,j|Yt1), 1ij4, and estimate the model using (pairwise) composite likelihood approach (see Pedeli & Karlis Citation2013, for an example in multivariate count time series analysis). As a consequence, in this paper, we focus on the GMM approach, which is much more computationally tractable.

27 Then the corresponding standard errors of the estimator Σ^ are calculated through the Delta Method.

28 Note, that even though the log-likelihood function has a closed form, in the estimation section, we did not use this result for estimation, but resorted to GMM instead. This is due to the fact that the GMM is much more computationally feasible for the estimation of our multivariate NBAR process.

29 Indeed, it suffices to adapt the proof of Proposition 3, by taking second order derivative in Equation (EquationA3) instead of the first order derivative.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.