Introduction

Operational risk is one of the key risks faced by the financial industry. The operational risk landscape has changed significantly over the last few years due to digital transformation and interconnected network systems, and such development has further intensified during the COVID-19 pandemic. These changes have led to cyber risk becoming one of the most threatening operational risks and a particularly challenging topic because of the lack of related data and potential contagion risk (Caporale et al. 2020; Uddin et al. 2020).Footnote 1 Several studies have modelled the cyber loss process (see, e.g. Edwards et al. 2016; Eling and Jung 2018; Eling and Wirfs 2019; Wheatley et al. 2021), but none have focussed on the financial industry. This is problematic because research shows a large heterogeneity in cyber risk between financial and nonfinancial industries (Eling and Wirfs 2019); it also highlights that the financial industry is prone to large attacks given their distinct features, such as large lawsuits and potential systemic risk (Uddin et al. 2020; Aldasoro et al. 2022).

To fill this gap, we model cyber loss severity in the financial services industry considering the world’s largest publicly available dataset of operational risk (the SAS OpRisk database). We use a two-step approach with base model selection and regression analysis through generalized linear models (GLM). The Tweedie model best describes cyber losses; this model has been widely used in the actuarial field (see, e.g. Jørgensen and de Souza 1994; Quijano Xacur and Garrido 2015; Shi 2016; Peña-Sanchez 2019; Delong et al. 2021) but has not yet been considered in the context of operational risk and cyber risk. We develop three financial industry-specific factors and empirically document that firm size, contagion risk and legal liability are the key drivers of cyber loss severity in the financial industry.

Our results have important implications not only for cyber risk management but also for the regulation of operational risk in the financial industry in general. Until the most recent reform of operational risk measurement by the Bank for International Settlements (BIS) in 2016, the loss distribution approach (LDA), as part of the advanced measurement approaches (AMA), was a popular internal risk model. The LDA characterizes firms’ individual risks by loss frequency and severity (Jin et al. 2020; Zhu et al. 2021). The new reform requiring all banks to use the standardized measurement approach (SMA) simplifies the quantification method and is a model-free approach based on accounting information that mainly focuses on company size (BIS 2016). There is a debate about whether the SMA can accurately measure the required capital, and many academics are concerned that the SMA does not correctly reflect the heterogeneity of individual operational risks (see, e.g. Peters et al. 2016; Dionne 2019, p. 378).Footnote 2 This study supports this point by claiming that operational risks in the financial industry should reflect the statistical features of firms’ individual risks.

Our study makes a threefold contribution to the literature. It is the first work to focus on cyber losses in the financial industry; second, it introduces the use of the Tweedie model for the calculation of cyber risk; and third, it makes an argument about a potential drawback of the Basel III reform. The paper is structured as follows. “Literature review and discussion of key factors” section reviews the relevant literature, followed by the methodology, which is provided in “Methodological background and model setup” section. “Data” section illustrates the data. The results and applications follow in “Results” section, and we conclude the paper in “Conclusion” section.

Literature review and discussion of key factors

Literature review

Operational risk management has been discussed extensively in the financial industry, especially how to accurately model this type of risk that is known for its heterogeneous features compared to other types of risks (such as market or credit risks). A financial institution could incur operational losses for various known and unknown reasons; a cyber breach could be one of these reasons. There is no established method for estimating operational risk exposure. Some researchers use risk events and loss data and analyse them using the value at risk (VaR) framework. However, challenges and pitfalls exist in measuring operational risk from loss data (Cope et al. 2009) because there is no standardized accounting approach or established record-keeping system to uniformly track losses from operational breakdowns across financial institutions globally.

In addition, financial institutions typically do not report operational loss data as a separate item in their audited financial statement or other disclosures. This means that financial institutions choose their own method for operational loss estimation. Hence, from an accounting perspective, loss data cannot be used as a reasonable proxy for operational risk. In regard to cyber risk, in some cases, loss information is complete (because of mandatory reporting requirements, for example, for data breaches in the U.S. and the European Union), whereas other types of risks are prone to the above reporting biases. For this reason, we do not claim that our estimation approach provides solutions to operational risk management in general. Our focus is rather narrow in the sense that we analyse drivers of cyber loss severity and predict the potential loss size based on them.

We review the distinct features of cyber risk events that the financial services sector may need to be aware of and how cyber operational losses have been modelled. Uddin et al. (2020) contribute to the discussion by analysing cybersecurity hazards and financial system vulnerability. They systematically review the literature to assess cybersecurity effects on operational costs of banks, their performance, operational risk-taking and cyber risk governance. Cyber risk significantly affects the costs of operational risk management for banks driven by the widespread digitalisation of banking operations. The authors identify that although financial regulators have suggested some nontechnical and technical guidelines for cyber risk governance, the underlying drivers of cyber risk events are not yet well understood. Our study contributes to filling this gap by proposing a two-step approach to address the statistical features and drivers of cyber loss severity.

Eling and Wirfs (2019) examine what drives the frequency and severity of cyber risk events. They use the same database of operational risk as that used in this study (SAS OpRisk) and analyse the data using the peaks-over-threshold model from extreme value theory. Economic losses are driven by the type of event and firm specifics such as country, industry or size. Heterogeneity among financial and nonfinancial firms is documented by including a dummy variable but is not further studied. The authors’ contribution is thus in line with that of the current study; however, we focus on the financial industry and suggest a new modelling approach (i.e. the Tweedie model).

Aldasoro et al. (2022) also investigate what factors drive cyber risk events using another large cyber risk-specific dataset from Advisen. They find that larger firms are more likely to have higher cyber costs than smaller firms, and events affecting multiple firms can lead to higher costs. Palsson et al. (2020) also study the features of cyber incidents using the Advisen dataset and determine that the financial sector is more exposed to cyber incidents and malicious risks can dominate overall cyber threats in most industry sectors.

Another set of studies examines how data breach losses can be modelled using the freely available Privacy Rights Clearinghouse (PRC) dataset. For example, Eling and Jung (2018) model the dependence structure of data breach losses by risk types and industries and provide potential risk measures at the aggregate level. Farkas et al. (2021) use a generalized Pareto approach to model extreme data breach claims, where loss frequency and severity are considered via regression trees. Our study can be differentiated from the above-mentioned literature as it proposes a two-step process to model cyber losses in which a factor analysis with an optimal distribution for the target variable is considered.

Key factors affecting cyber loss severity

Based on their extensive review, Uddin et al. (2020) identify that the widespread application of cyber technology is a paradox because operational benefits come with the inherent risk of a cyber breach, and the effect is often unpredictable. Hence, it is essential to identify the reasons why an institution is more or less susceptible to cyber threats and which factors drive cyber loss severity to predict the potential amount of cyber losses. We focus on three factors that have been discussed in the literature as being critical and influential in explaining cyber risk events and loss amounts, namely, size, contagion risk and legal liabilities. The importance of these three factors may hold not only for the financial industry but also for other industries that are exposed to cyber risks. However, our focus is on the financial industry to discuss how the banking regulatory framework for operational risk can be further improved by taking into account the features of cyber operational risks.

The financial industry is known for being relatively more exposed to cyber risks (Uddin et al. 2020) and has the second largest average costs per breach event (after health care; see Ponemon Institute 2021). In this context, both industry studies and academic literature have documented that firm size is associated with the size of losses by cyber risk events (see, e.g. Ponemon Institute 2021; Aldasoro et al. 2022; Eling et al. 2022). While most results show a positive relationship, the elasticity of the firm size effect is shown to be rather low, which implies that large firms may not always be expected to face extremely large costs (Aldasoro et al. 2022). Eling et al. (2022) argue that this effect is due to economies of scale, regulatory compliance and the “wait-and-see” strategy of small firms potentially worsening network weaknesses.Footnote 3 We thus consider firm size as one potential driver of loss severity.

The financial industry is also known for high interconnectivity with similar business models and similar IT systems between players; a security weakness in one party may cause a systemic impact on other parties. Relatedly, Eling et al. (2022) determine that a relatively weak cybersecurity system may lead to high total costs. This potential systemic impact of cyber risk events on the financial industry has also been discussed by Eisenbach et al. (2021). The complexity and high interconnectivity of the U.S. financial system may cause vulnerability in regard to cyberattacks. A systemic cyberattack could diminish a bank’s ability to serve its creditors. The authors empirically determine that the impairment of the five most active U.S. banks (i.e. the most interconnected parties) might result in spillover effects that impact an average of nearly 38% of their industry network. This finding reveals the concern that a systemic collapse caused by a catastrophic cyber event might be realized in the financial industry. Aldasoro et al. (2020) also show that the financial industry can have a large number of cyberattacks and thus be exposed to major threats to financial stability. Systemic risk is driven by large firms and particular business models that are more interconnected within the industry (Uddin et al. 2020). Based on the extensive literature, we analyse the level of contagion of cyber risk events and its impact on the loss amount.

In addition to size and contagion risk, third-party liability might significantly affect the total loss amount of cyber events. This is because cyber events not only cause direct losses but also spill over to clients, who then sue the attacked company. Such third-party liabilities might take up a significant amount of costs (Romanosky et al. 2019) and are covered by cyber-liability insurance, including legal liability, vicarious liability and network security liability (Biener et al. 2015). Legal liabilities represent defence and claims expenses and regulatory fines, whereas vicarious liabilities are caused by events occurring from outsourcing parties; network security liabilities primarily include costs from reinstatement and legal proceedings (Biener et al. 2015). Until recently, the majority of cyber claims resulted from general liability policies; however, claims tend to be rising for network security and privacy liability policies as well (McLeod 2015). Considering the potential significant impact of such liabilities on the total cyber costs, we disentangle a variable that addresses whether an event contains liability.

Methodological background and model setup

Tweedie process

To make the paper self-contained, we describe the key methodological steps of the suggested two-step estimation process. We first introduce the Tweedie process to be fitted to the empirical data in the first step. The Tweedie model is an efficient tool that can replace two-part model splitting loss frequency and severity by providing statistical features of two components in a single model (Tweedie 1984; Jørgensen and de Souza 1994). The probability density function of a Tweedie process shows the majority of its mass at zero and the rest highly skewed to the right; thus, it applies to datasets in which a large number of zeros and highly skewed non-zeros are mixed. As illustrated in Table 1, well-known discrete and continuous distributions used in a loss model can be represented by the Tweedie model as per its power parameter, \(p\in \mathrm{R}\) (Ohlsson and Johansson 2010, Chap. 2).Footnote 4

Table 1 Parameter and distribution types of the Tweedie process

To describe the Tweedie distribution with its parameters, let us define \({y}_{j}\) by an i.i.d. response variable, which is independent of N following a Poisson distribution with mean \(\lambda.\) Each \({y}_{j}\) follows a gamma distribution with a shape parameter of \(\alpha\) and rate parameter of \(\beta\); then, the summation of \({y}_{j},\) where \(j=1,\ldots,N,\) is a Poisson sum of gammas (i.e. \(S={\sum }_{j=1}^{N}{y}_{i}\)). The Tweedie distribution facilitates mixing a peak point at \(S=0\) and the other part \(S>0.\) The peak of the distribution at \(S=0\) represents the probability of zero loss; thus, \(P\left(S=0\right)=P\left(N=0\right)={e}^{-\lambda }.\) Following Frees et al. (2016), we describe the other part where \(S>0\) as follows:

$$P\left(S\le y\right)=\sum_{n=1}^{\infty }P\left(N=n\right)P\left({S}_{n}\le y\right), y\ge 0.$$
(1)

Thus, as Frees et al. (2016) define, the probability function of the Tweedie distribution is as follows:

$${f}_{S}\left(y\right)=\sum_{n=1}^{\infty }{e}^{-\lambda }\frac{{\lambda }^{n}}{n!}\frac{{\beta }^{n\alpha }}{\Gamma \left(n\alpha \right)}{y}^{n\alpha -1}{e}^{-y\beta },$$
(2)

where \(\Gamma \left(\bullet \right)\) is the gamma function.

The parameters of the Poisson and gamma distributions incorporated in the Tweedie distribution can be addressed by the expectation of the variable S (i.e. \(E\left(S\right)=\mu\)), the scale parameter \(\phi\) and the power parameter, p, as follows:

$$\lambda=\frac{{\mu }^{2-p}}{\phi \left(2-p\right)},$$
$$\alpha =\frac{2-p}{p-1},$$
$$\frac{1}{\beta }=\phi \left(p-1\right){\mu }^{p-1}.$$

A Tweedie process with a power parameter between 1 and 2 (\(p\in \left({1,2}\right)\)) is generally defined as a Poisson sum of a gamma distribution, which represents a compound loss process. For more detail on the specification of the Tweedie distribution, we refer to Jørgensen and de Souza (1994) and Ohlsson and Johansson (2006), where the mean and variance parameters and their relations with the power parameter are elaborated. By comparing the Tweedie model and other competitors, we determine the optimal model by the minimum Akaike information criterion (AIC) (Akaike 1973) and the acceptance of the null hypothesis of the Kolmogorov–Smirnov (K–S) goodness-of-fit test (Smirnov 1939).

Variable description and the model setup

The second step of the process is to implement a regression-based model to investigate key drivers of cyber loss severity based on the fitted distribution from the first step. We first describe the variables to be used in the model. The target variable is the total loss (in million U.S. dollars) caused by a cyber risk event. The losses provided by the SAS database incorporate direct and indirect costs and consist of legal liability, regulatory action, asset damages, restitution, loss of recourse and write-down losses (Eling and Wirfs 2019).

As explanatory variables, we consider the three above-mentioned key variables as potentially affecting the amount of cyber losses. The first variable is firm size, which is represented by the annual revenue or the number of employees of victim organizations. The literature in the cyber risk context that uses different loss data from that used in our study has documented that the larger an institution exposed to cyber risk is, the larger the losses they likely to occur are (Romanosky 2016; Aldasoro et al. 2022; Jung 2021). This is, for example, because a larger organization tends to have a larger exposure (e.g. the number of computers counted for the number of employees and computerized assets) of vulnerability to cyberattacks.

We also take two variables into account for potential contagion effects, namely, events that either affect multiple firms or lead to multiple losses. Accounting for such effects with these variables is material to investigating the potential cyber systemic risk to which the financial industry can be significantly vulnerable. The third key variable included in the model is a variable that represents a firm exposed to liability risk. Identifying the impact of liability risk is significant because such risk can raise the total cost for victim organisations.

As control variables, we consider different risk types as binary variables, i.e. acts of people, system failures and failures in business processes. These risk types are based on the Basel classification of operational risks, where the external event risk is used as the base group in the model. Geographical location might also explain how severe cyber losses are. Developed countries with a high GDP, high levels of internet penetration and extensive internet use tend to have more potential victims of cyberattacks compared to their counterparts (Namestnikov 2012). To address potential heterogeneity in cyber exposure in the geographical aspect, we consider three geographical variables, namely, Asia, Europe and North America. Observations in other areas are categorized as “others” and used as the base group for this type of information in the model. Table 2 shows the target variable (total loss) and explanatory variables used in the second step of the estimation process.

Table 2 Variable description

Using all of these variables, we construct a regression-based model to investigate the impacts of key variables on the cyber losses amount. We apply the optimal distribution of cyber losses to model the response variable of the GLM in a matrix form for conciseness as follows:

$$g\left({\mu }_{i}\right)={\mathbf{\rm X}}_{i}^{^{\prime}}{\varvec{\beta}},$$
(3)

where \(g\left(\bullet \right)\) is a known function called a link, \({\mu }_{i}\) is the mean of the response \({y}_{i},{\mathbf{X}}_{i}\) is a matrix expression of explanatory variables described in Table 2 and \({\varvec{\beta}}\) is a vector of coefficients. The underlying distribution of the response variable \({y}_{i}\) can be specified in the exponential family, where discrete (e.g. Poisson), continuous (e.g. normal, gamma) and mixture (Tweedie) distributions are included (Frees 2009, Chap. 13). In this study, we aim to model cyber loss severity in the continuous form, where the distribution of the response variable belongs to the exponential family. We use the fitted values of the model to simulate aggregate cyber losses and estimate risk measures.Footnote 5

Data

We consider the SAS operational risk database,Footnote 6 which has data collected from March 1984 to May 2021 and provides loss events above $100,000.Footnote 7 The database includes 37,652 operational loss events worldwide, which makes it the world’s largest and most comprehensive repository of publicly available information on operational losses. We use 2,852 observations related to cyber risk, following the text mining presented in Eling and Wirfs (2019).Footnote 8 We differentiate the financial services industry (e.g. banking, insurance, card issuers) from nonfinancial industries. This selection leads to 2186 (666) cyber loss events from the (non)financial industry.Footnote 9 The data include information on risk types, dates of events, regions, firm-specific factors (e.g. revenue, assets, shareholder equity, the number of employees), loss size and contagion effects (e.g. whether multiple cases are affected or not). The target variable is longer-tailed for the financial industry than for nonfinancial industries (see Fig. 1).

Fig. 1
figure 1

Histograms of log-transformed (natural logarithm) total cyber loss in financial (left) and nonfinancial (right) industries

Firm size is represented by either revenue or number of employees; to avoid multicollinearity between two firm size proxies, we test these variables in two different models. Descriptive statistics are shown in panels A and B of Table 3 for financial and nonfinancial industries, respectively.Footnote 10 Firm size and average loss size are larger for nonfinancial firms; however, the variation and the maximum size of cyber losses are larger for financial firms. This might mean that although nonfinancial firms might experience larger cyber losses on average, extreme cases are more likely to occur in financial firms.

Table 3 Descriptive statistics of cyber risk data

We implement a two-step approach to investigate the loss severity of financial and nonfinancial industries and to estimate potential loss size based on cyber operational risk. This two-step approach consists of finding an optimal distribution for univariate loss severity and then predicting the loss amount based on the generalized linear model with the optimal distribution identified in the first step. For the first step, we consider the Tweedie model and five other nonnegative distributions (i.e. lognormal, gamma, Weibull, Cauchy and lognormal-GPD of the peaks-over-threshold method) that have been widely used in operational loss and cyber risk modelling (see, e.g. Shevchenko 2010; Eling and Jung 2018; Eling and Wirfs 2019).

Results

Table 4 shows the result of the model selection step for cyber loss severity by testing six competitive models with AIC values and K–S goodness-of-fit test statistics. We find that the Tweedie distribution best fits the cyber losses for both the financial and nonfinancial industries with the lowest AIC value and the acceptance of the null hypothesis of the K–S test. This finding is supported in Fig. 2, where good fits for the Tweedie are observed in the Q-Q, CDF and P-P plots. We then apply the Tweedie distribution to the response variable of the GLM approach in Table 5, where we examine key factors that drive the size of cyber losses.

Table 4 Optimal base model for cyber loss severity (step 1)
Fig. 2
figure 2

Graphical diagnosis of the Tweedie fit for the first step. The QQ plot, CDF and PP plot are displayed in turn from the left

Table 5 GLM results using the optimal Tweedie base model (step 2)

In Table 5, we present the Tweedie-GLM results in three categories: (1) the full model with the full set of variables vs. a nested model with our three key factors,Footnote 11 (2) annual revenue vs. the number of employees as firm size proxy and (3) financial industry vs. nonfinancial industry. A compound process with the power parameter (p) between 1 and 2 turns out to be fitted best for our dataset in all models (1.9 in Table 5).

We find that firm size represented by either the annual revenue or the number of employees is mostly significant for the financial firms in explaining the size of total loss by cyber operational risk events. In particular, the statistical significance of the firm size variables is stronger for the nested models. The signs of the coefficients of firm size variables are positive, which implies that cyber costs increase with firm size. The results also confirm the literature claiming that the elasticity of the firm size effect can be low. Our result shows that, for example, under the nested model using annual revenue, a 1% increase in log-revenue (thus, a larger size of increase in revenue without log-transformation) may lead to only a 0.27% increase on average in the cyber cost (= exp(0.0027)), ceteris paribus. That is, the increase in cyber costs may not be too sensitive to firm size, which can result from economies of scale, regulatory compliance and the underinvestment of small firms in cybersecurity (Eling et al. 2022).

We also determine that the contagion effects that affect multiple firms and cause multiple losses through a single event are positive and significant for the financial industry in explaining the total costs. This result supports the documented findings of the literature that contagious cyber events can worsen the financial impacts on victim organizations. In particular, our finding is in line with Eling et al. (2022) that a weak cybersecurity potentially increases risk; contagion risk can have significant financial impacts on large-scale events.

As last key factor of cyber costs, financial firms also appear to have significant legal payments; hence, they tend to face higher legal liability costs. This evidence is in line with Bouveret (2018), who argues that the higher risks faced by the financial industry may result from a loss of trust and confidence due to the utilized business model that has capital management and monetary transactions at its core. This might be associated with legal actions by customers when cyber risks (such as data breaches) affect their financial accounts or systems.

For the other variables, we note that the European affiliation of financial firms may lead to an increase in cyber cost, whereas firms affiliated with North America exhibit lower costs. However, when considering the nonfinancial industry case as a benchmark, both coefficients of European and North American affiliation are negative and significant. Although we have no explicit evidence on this finding between European and North American firms, one possible explanation might be the regulation of cyber event disclosure. As Gordon et al. (2018) note, the 2011 U.S. Securities and Exchange Commission (SEC) disclosure guidance has pushed North American firms to report their cybersecurity risks and incidents, which may motivate them to enhance cybersecurity as a significant element of their internal controls. Last, the comparison with nonfinancial industries as a benchmark helps us understand that contagion and legal risks may still significantly affect other types of entities that are exposed to cyber risks, as we argue in “2.2” section. In Appendix 2, we further investigate how the impacts of firm-specific factors can be above certain thresholds for extreme loss events (i.e. 56%, 90% and 95%), where we observe mostly identical results to those found in Table 5.

We use the estimation results of Table 5 to predict how vulnerable firms are to potential cyber events and to illustrate the potential heterogeneity across firms. In Table 6, we generate the Tweedie distributions by calibrating Tweedie parameters from the fitted models for financial firms. Risk measures from another GLM-based model using gamma for a continuous response variable, those from three univariate models (lognormal, lognormal-GPD and empirical) and those for other operational risks (i.e. noncyber) from three univariate models are considered as benchmarks.Footnote 12 We differentiate potential losses by considering whether contagion risk and liability payment are present.Footnote 13 We simulate the distributions with 100,000 iterationsFootnote 14 and consider value-at-risk (VaR) and expected shortfall (ES) at the 99% quantile, which are both used in regulatory frameworks (e.g. Basel III and the Swiss Solvency Test).

Table 6 Loss estimates of cyber operational risk events in the financial industry

The results in Table 6 demonstrate that contagion risk and legal liabilities can impose a heavy burden on victims. Financial firms with high levels of interconnectivity are more likely to be exposed to large loss amounts going beyond $100 m which is more than four times the average loss amount of $ 24.953 m documented in Table 3.Footnote 15 Moreover, cyber risk events could generate huge liability costs for victims. We observe that the loss estimates of the Tweedie-GLM are slightly smaller than those of the gamma GLM. For univariate models that do not consider firm characteristics, our loss estimates are smaller for expected shortfall than those of lognormal and lognormal-GPD.

We also find that other operational losses are larger than those of cyber losses under the univariate models. This finding is in line with Eling and Wirfs (2019), who find that the distribution of noncyber operational losses is heavier-tailed than that of cyber losses. Overall, our application results indicate that neglecting heterogeneity from interconnectivity and legal liability might lead to firms being in trouble with regard to capital management, thereby increasing their likelihood of insolvency. Moreover, insurers that provide corporate solutions against cyber risks may face potential extreme claims of cyber risks if such heterogeneity in cyber risks is not fully addressed in their underwriting process.

Although we do not provide a direct comparison of our results with the SMA (Basel III), our findings provide directions for improving operational risk measurement, particularly with regard to cyber operational risks. Peters et al. (2016) outline the flaws of the SMA as follows: it introduces capital instability, reduces risk responsivity, induces risk-taking, fails to utilize the range of data sources, fails to provide risk management insight and can be a super-additive capital calculation. Based on their results, the authors argue that the SMA cannot be considered as an alternative to AMA models (and instead propose the standardization of AMA models). Our results illustrate many of these general points for the case of cyber risk and suggest that a standardized AMA model might better reflect the operational risk environment. The consideration of pure volume-based indicators from the annual report (as done in the SMA, mainly reflecting business size)Footnote 16 does not well reflect the risk sensitivity and might create problematic incentives, at least in regard to cyber risk.

Specifically, the potential contagion risk that can be heterogeneous for banks due to their interconnectedness may not be fully addressed in the SMA formulation. It is difficult to identify what factors in the SMA can incorporate potential losses (or costs) from interconnectivity in the network environment. For example, IT-related administrative costs or outsourcing IT supplies are not included in the profit and loss items of the SMA formulation (BIS 2016, Annex 1). Our findings illustrate that banks with higher contagion risks and higher legal risks should have higher capital for cyber risks. Thus, considering the increasing impacts of cyber risks and the increasing dependency on digital transformation in the financial industry, regulators may need to take the impact of interconnectivity in the financial systems on operational losses into account.

Conclusion

We propose a two-step approach to modelling large cyber losses with a systematic, statistical process. We use cyber risk-related loss data from the world’s largest publicly available database of operational risk to find an optimal base model for loss severity and the key determinants of such losses for the financial services industry. The Tweedie model best explains the statistical features of large cyber losses. The key drivers of determining cyber losses of financial firms are firm size, legal liability and contagion effects that cause multiple losses from a single event. Thus, contagion and legal risk are important features of cyber events that must be properly managed. Additionally, cyber risk management must be aligned with firm size. We also show the heterogeneity across firms by applying our model to estimate risk measures and find that contagion risk and liability payments can nearly double the loss estimates. This finding implies that a heterogeneous level of interconnectivity and potential liability should impact the size of the capital requirement if financial firms want to be able to fully cover potential extreme cyber losses. These variables also need to be reflected in insurance prices if a respective amount of coverage is to be offered.

The heterogeneity across firms sheds some critical light on the decision of financial regulators to simplify the operational risk capital requirement; it also shows the importance of considering firm characteristics and of taking a loss distribution-based approach to the modelling of operational risks by investigating cyber operational losses. For example, the potential contagion risk that is currently not considered in the reform of operational risk measurement may have heterogeneous impacts on firms’ cybersecurity capacity and interconnectivity, and this risk may cause considerable losses that heavily affect firms’ capital management. Although the LDA is no longer valid for operational risk measurement under the Basel framework, a potential way to improve operational risk measurement is to standardize a stepwise approach to consider such heterogenous features under the GLM-based analysis. Traditional actuarial rate-making may help to achieve this; however, from the financial regulatory perspective, one may need to consider the extent to which heterogeneous firm-specific factors affecting operational loss events can be allowed.