The Willis Fortune 1000 Cyber Disclosure Report, 2013

12
WILLIS FORTUNE 1000 CYBER DISCLOSURE REPORT “Securing cyberspace is one of the most important and urgent challenges of our time. In light of the growing threat and the national security and economic ramifications of successful attacks against American businesses, it is essential that corporate leaders know their responsibility for managing and disclosing information security risk.” 1 Letter from Senator John D. Rockefeller IV, et al. to Chairman, Securities and Exchange Commission, May 11, 2011 I. OVERVIEW In this second in a series of reports examining U.S. public company cyber disclosures, Willis expands the scope of the review to include the Fortune 1000. The earlier Willis Fortune 500 Cyber Disclosure Report reviewed the 10-Ks or annual reports filed by the Fortune 500 in 2012, the period immediately after the U.S. Securities and Exchange Commission (SEC) published its guidance that public companies might best include more extensive disclosures relating to their cyber exposures. 2 The initial study addressed three important questions on the public disclosures of those companies: 1) The size or extent of the risk 2) The types of exposures identified 3) The steps being taken to reduce cyber risks This updated study asks the same questions of the wider pool of companies and highlights industry groups. The SEC’s suggested guidance was that U.S. public companies include the nature of the risks and how each risk might affect the firm, recommending that these disclosures be unique and specific to each firm, not generic. Quite a tall order for U.S. public companies and for the SEC, which reviewed, and in some cases commented on, the reports prior to releasing them to the public. Many of our largest public companies face interdependent exposures and were largely unable to review

Transcript of The Willis Fortune 1000 Cyber Disclosure Report, 2013

Page 1: The Willis Fortune 1000 Cyber Disclosure Report, 2013

WILLIS FORTUNE 1000 CYBER DISCLOSURE REPORT

“Securing cyberspace is oneof the most important andurgent challenges of ourtime. In light of the growingthreat and the nationalsecurity and economicramifications of successfulattacks against Americanbusinesses, it is essentialthat corporate leadersknow their responsibility formanaging and disclosinginformation security risk.”1

— Letter from Senator John D.Rockefeller IV, et al. to Chairman,

Securities and Exchange Commission,May 11, 2011

I. OVERVIEWIn this second in a series of reports examining U.S. public companycyber disclosures, Willis expands the scope of the review to includethe Fortune 1000.

The earlier Willis Fortune 500 Cyber Disclosure Report reviewed the10-Ks or annual reports filed by the Fortune 500 in 2012, the periodimmediately after the U.S. Securities and Exchange Commission(SEC) published its guidance that public companies might bestinclude more extensive disclosures relating to their cyber exposures.2

The initial study addressed three important questions on the publicdisclosures of those companies:

1) The size or extent of the risk 2) The types of exposures identified 3) The steps being taken to reduce cyber risks

This updated study asks the same questionsof the wider pool of companies and highlightsindustry groups.

The SEC’s suggested guidance was that U.S.public companies include the nature of therisks and how each risk might affect the firm,recommending that these disclosures beunique and specific to each firm, not generic.

Quite a tall order for U.S. public companiesand for the SEC, which reviewed, and in somecases commented on, the reports prior toreleasing them to the public. Many of ourlargest public companies face interdependentexposures and were largely unable to review

Page 2: The Willis Fortune 1000 Cyber Disclosure Report, 2013

the disclosures of their trading partners and vendors at the time they were filing their ownreports. Responding to the SEC’s guidance for the first time had to have been a challenge.

II. BIG VERSUS BIGGER: COMPARING THEFORTUNE 501-1,000 TO THE FORTUNE 500

QUANTIFYING THE RISKWhile there are significant differences in the industry makeup of the Fortune 500 and theFortune 501 to 1,000, remarkable similarity exists between the two groups in theirdisclosures on the size or extent of their cyber exposures. The most significant difference wefound was in the number of companies that remained silent on their cyber risk: 12% in theF500 segment was silent, compared to 22% in the F501-1000 (see Chart 1 below). Thereason for this may be that, as companies get smaller, they may see themselves as less likelytargets of an attack, or it may be that smaller companies needed more time to identify theircyber exposures.

2 Willis North America • 08/13

12%

Silent onCyber risk

Cyber risk would“impact” or

“adversely impact”the business

Cyber risk“significant”

Cyber risk“material harm” or“seriously harm”

Cyber risk“Critical”

No SEC Filings (No Disclosure +

No Recent Disclosure)

40%

35%

30%

25%

20%

15%

10%

5%

0%

22%

37%

30%

8%

5%

36% 35%

2% 3%

6% 6%

REPORTED EXTENT F500 v F501-1000

F500 F501-1000

PERC

ENTA

GE O

F CO

MPA

NIES

CHART 1

While the SEC’s guidance is just that, advice on what public companies might disclose, it comes from their Division of Corporation Finance – the division that selectively reviewspublic company securities filings to ensure compliance with relevant disclosure andaccounting requirements. When they speak, public companies usually listen.

Page 3: The Willis Fortune 1000 Cyber Disclosure Report, 2013

3 Willis North America • 08/13

CYBER EXPOSURES IDENTIFIEDThe companies in both the F500 and the F501-1000 groups used similar terms to explain thecyber exposures facing their organizations. The most significant differences between thetwo groups, as seen in Chart 2, are:

1) A rise in the exposure to business interruption as a result of a cyber event (from 21% forthe F500 to 29% for the F501-1000)

2) A reduction in the perceived exposure to cyber terrorism (from 21% to 15%) 3) A reduction of intellectual property risks identified (from 13% to 8%)

For the Fortune 1,000, cyber terrorism and intellectual property risk disclosures are lowerthan we expected given the focus of the federal government on these areas of risk and theirpossible effects upon the health of the U.S. economy overall.

We note that the disclosure of actual cyber events remains at 1%, a seemingly low numbergiven the number of attacks that appear in the press on a regular basis. Furthermore, eventhough the SEC guidance requests dollar costs of attacks that have occurred, none of thecompanies that disclosed actual attacks included the associated costs.

CHART 2 REPORTED EXPOSURES F500 v F501-1000

Privacy/loss of confidential data

Reputation risk

Malicious acts

Liability

Business Interruption

Errors and malfunction

Cyber terrorism

Cyber regulatory risk

Outsourced vendor risk

Loss of intellectual property

Product or service failure

Social media risk

Actual cyber events

| | | | | | | | |

0 10% 20% 30% 40% 50% 605 70% 80%

PERCENTAGE OF COMPANIES

F500 F501-1000

68%

61%

52%

48%

49%

49%

41%

44%

21%

29%

22%

21%

21%

15%

18%

15%

13%

12%

13%

8%

2%

5%

2%

1%

1%

1%

Page 4: The Willis Fortune 1000 Cyber Disclosure Report, 2013

4 Willis North America • 08/13

LOSS CONTROL: RISK PROTECTIONSAnother significant difference between the two groups is the major drop in the discloseduse of technical risk protections – such as firewalls, intrusion detection, encryption, etc. –mentioned by 52% of the F500 but only 35% of the F501 – 1000 (see Chart 3). Thedisclosure of insurance for cyber risk remains steady at 6% for both groups (see morebelow), but the numbers of companies that make no reference at all to the protectionsthey have in place rose from 45% in the F500 to 57%. This may be attributable to thehigher percentage of companies that are silent on the topic of cyber exposure in the F501-1000 group.

Reference to technical safeguards

Reference to inability to have the resources

to limit loss

Cyber risks are coveredby insurance

No comments on risk protection

70% —

60% —

50% —

40% —

30% —

20% —

10% —

0 —

REPORTED RISK MANAGEMENT F500 v F501-1000

52%

35%

15%17%

6%

45%

6%

57%

F500 F501-1000

PERC

ENTA

GE O

F CO

MPA

NIES

CHART 3

III. INDUSTRY FOCUSWillis divided the Fortune 1,000 into 20 industry groups to compare the disclosure of each.In doing so we recognize that while all industries are important, not all are critical. In fact,the Presidential Policy Directive on Critical Infrastructure Security and Resilience hasidentified 16 essential industry sectors as critical infrastructure.3 Most, but not all, areincluded in our industry focus on the Fortune 1,000.4

Among those critical sectors, some are hyper-critical, such as the technology and telecomsector – since it serves an “enabling function” across all other critical infrastructure sectors.5

Others are both critical and highly interdependent – such as the health care sector, where

Page 5: The Willis Fortune 1000 Cyber Disclosure Report, 2013

5 Willis North America • 08/13

collaboration and information sharing between the public and private sectors is essentialand which is highly dependent on other industry sectors for continuity of operations andservice delivery.6

In our industry focus, we addressed the same questions as we did in our original study onthe Fortune 500: 1) the size or extent of risk, 2) how the exposure would manifest and 3)what protections were being employed.

To measure the level of concern of each industry, Willis assigned a score for the extent ofcyber risk each company disclosed. Using this score, health care is the industry mostconcerned about cyber risks, closely followed by the technology, insurance, telecom andretail sectors (see Chart 4). The sectors that disclosed the least level of concern are realestate and, perhaps more surprisingly, financial services-funds, conglomerates and theenergy and mining sectors.

EXTENT OF THE RISK – BY INDUSTRYThere are significant differences in the disclosures involving the size or extent of the cyberrisk faced by different industries in the F1000. Some of the variation may be as a result ofthe small number of companies in some industry groups but clearly, some industries aremore exposed to the issue than others. 7

Health Care

Technology/Telecoms

Financial Services – Insurance

Life Sciences

Retail/Distribution

Hospitality and Travel

Utilities

Financial Services – Banking

Media

Manufacturing – High Tech/Aerospace

Manufacturing – Consumer

Transport

Professional Services

Miscellaneous Services

Construction

Manufacturing – Heavy Industry

Energy/Mining

Conglomerates

Financial Services – Funds

Real Estate

FORTUNE 1000 – INDUSTRY POINT SCORE – EXTENT OF RISK

2.14

2.09

2.08

2.00

1.98

1.97

1.96

1.84

1.66

1.65

1.63

1.56

1.56

1.51

1.45

1.35

1.16

1.14

1.00

0.69

| | | |

0.00 1.00 2.00 3.00

CHART 4

Page 6: The Willis Fortune 1000 Cyber Disclosure Report, 2013

6 Willis North America • 08/13

Industries that are naturally more reliant on technology and open networks such as banking, technology, aerospace,health care and utilities are more likely to disclose “significant” or “material impact” as the likely result of a cyber event(see Chart 5 below).

The limited number of companies that describe their exposure to a cyber event as “critical” are scattered throughoutthe industry sectors with professional services firms standing out as the sector that most often describes the exposureas critical, with 11% of the industry putting cyber risk in that category. Otherwise, there is no discernible pattern amongcompanies or groups that note the risk as “critical.”

n 62% of real estate companies did not have any comment on cyber risk n 38% of the energy and mining sector remained silent as to cyber exposure

Life Sciences

Manufacturing - High Tech/Aerospace

Technology/Telecoms

Financial Services – Banking

Utilities

Retail/Distribution

Health Care

Hospitality and Travel

Media

Financial Services – Insurance

Manufacturing – Consumer

Professional Services

Miscellaneous Services

Transport

Construction

Conglomerates

Manufacturing – Heavy Industry

Financial Services – Funds

Energy/Mining

Real Estate

|

FORTUNE 1000 – EXTENT OF LOSS BY INDUSTRY

5% 35% 10% 44% 5%

8% 43% 8% 39% 2%

9% 38% 6% 43% 4%

9% 34% 9% 47% 1%

10% 29% 4% 53% 4%

10% 35% 3% 52%

10% 45% 17% 24% 3%

11% 29% 5% 53% 3%

20% 38% 4% 36% 3%

22% 44% 22% 11%

23% 37% 9% 29% 3%

26% 29% 9% 32% 3%

27% 32% 9% 32%

29% 43% 14% 14%

33% 33% 3% 28% 3%

33% 50% 17%

38% 34% 4% 21% 2%

62% 15% 15% 8%

5% 60% 35%

50% 35%

| | | | | | | | | |

0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%

Silent on cyber risk Cyber risk would “impact” or “adversely impact” the business

Cyber risk “significant” Cyber risk “material harm” or “seriously harm” Cyber risk “critical”

CHART 5

Page 7: The Willis Fortune 1000 Cyber Disclosure Report, 2013

7 Willis North America • 08/13

Financial Services – Banking

Financial Services – Insurance

Technology/Telecoms

Financial Services – Funds

Life Sciences

Media

Manufacturing - High Tech/Aerospace

Hospitality and Travel

Professional Services

Retail/Distribution

Miscellaneous Services

Health Care

Construction

Manufacturing – Consumer

Utilities

Conglomerates

Transport

Real Estate

Manufacturing – Heavy Industry

Energy/Mining

FORTUNE 1000 INDUSTRIES – NUMBER OF EXPOSURES DISCLOSED

4.90

4.55

4.28

4.00

4.00

3.83

3.80

3.68

3.67

3.61

3.43

3.18

2.73

2.67

2.62

2.43

2.24

2.23

2.12

1.66

| | | | | |

0.00 1.00 2.00 3.00 4.00 5.00

CYBER RISK EXPOSURES – BY INDUSTRYTo provide a different perspective, we totaled the number of different types of risks that companies disclose intheir 10-Ks and averaged them for each. Looked at it this way, financial institutions and technology companiesrise to the top of the list with the banking sector disclosing an average of 4.90 distinct cyber exposures (seeChart 6).

Interestingly, funds companies, featured at the low end of the scale when describing the extent of their cyberrisk exposure, are close to the top of the chart when it comes to describing the number of different types ofcyber risks that they face. While the small number of companies in the funds group (3) may account for thediscrepancy, the difference may be due to a level of caution in an industry that is risk-management focusedbut does not have a large exposure to personally identifiable information, which is usually kept at the retailinvestment company level.

CHART 6

Industries at the lower end of the chart (reporting fewer exposures) include energy and utilities. Surprising,given that both have been identified as critical to the economy and covered in the press as objects of cyberattacks.

Page 8: The Willis Fortune 1000 Cyber Disclosure Report, 2013

8 Willis North America • 08/13

LOSS CONTROL – BY INDUSTRYThe industry groups that disclosed the greatest number of technical protections against cyber risk (firewalls, intrusiondetection, encryption etc.) are the technology, health care, professional services and financial institution sectors withthe insurance industry in the lead (see Chart 7). Insurance companies refer to technical risk protections 63% ofthe time.

Conglomerates

Manufacturing – Heavy Industry

Real Estate

Financial Services – Funds

Hospitality and Travel

Energy/Mining

Construction

Life Sciences

Manufacturing – Consumer

Utilities

Transport

Miscellaneous Services

Technology/Telecoms

Retail/Distribution

Financial Services – Banking

Health Care

Media

Professional Services

Manufacturing - High Tech/Aerospace

Financial Services – Insurance

| | | | | | | | | | |

0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%

31% 15% 8% 69%

33% 17% 33% 50%

35% 13% 3% 58%

36% 16% 2% 59%

36% 18% 59%

38% 13% 50%

39% 6% 2% 61%

40% 19% 15% 49%

41% 9% 3% 56%

43% 31% 9% 46%

44% 20% 11% 44%

49% 17% 9% 46%

53% 24% 14% 39%

55% 26% 1% 41%

55% 10% 10% 41%

56% 11% 10% 33%

60% 25% 5% 30%

63% 18% 11% 24%

29% 4% 2% 71%

14% 14% 71%

Reference to technical safeguards Reference to inability to have the resources to limit loss

Cyber risk are covered by insurance No comments on risk protection

CHART 7 FORTUNE 1000 – RISK PROTECTION (%)

Page 9: The Willis Fortune 1000 Cyber Disclosure Report, 2013

9 Willis North America • 08/13

The industries within the Fortune 1,000 that most frequently state they have insufficient resources to limitthe consequences of a cyber attack are miscellaneous services (31%)7, health care (26%), hightech/aerospace (25%) and banking (24%). As the Fortune 1,000 includes the very largest U.S. publiccompanies, this may be a serious concern.

LOSS PROTECTION – INSURANCEThe industries in our study that disclose they have the greatest level of insurance of cyber risks for theirsectors are the funds sector (33%), followed by utilities (15%), the banking sector and conglomerates (14%).The insurance and the technology sectors both disclose the purchase of insurance covering cyber risk at the11% level (see Chart 8 below).

A recent informal survey of life and health insurance companies conducted by Willis and key cyberinsurance underwriters found that in the F1000, more that 60% of this sector purchased stand-alone cybercoverage. Willis concludes that many companies may be under-reporting insurance covering cyber risks. Inour experience, the health care sector has been one of the largest purchasers of stand-alone cyber insurance,but only 1% of the industry mentioned purchasing it in their 10-Ks.

Manufacturing – Consumer

Retail/Distribution

Manufacturing – Heavy Industry

Energy/Mining

Technology/Telecoms

Health Care

Financial Services – Banking

Utilities

Financial Services – Insurance

Transport

Miscellaneous Services

Hospitality and Travel

Media

Construction

Manufacturing - High Tech/Aerospace

Real Estate

Life Sciences

Professional Services

Conglomerates

Financial Services – Funds

118 2

106 10

92 2

88 2

88 11

72 1

44 7

39 8

34 4

33 1

33 2

30 1

26 3

22

19 1 12 1 2

12 1

8

8 1

6 1

4 2

| | | | | | |

0 20 40 60 80 100 120

INSURANCE COVERAGE – NUMBER OF COMPANIES

Silent Yes

CHART 8

Page 10: The Willis Fortune 1000 Cyber Disclosure Report, 2013

DETAILS PLEASEIn its guidance, the SEC suggested that U.S. public companies include a level of detail notpreviously seen in most public company disclosures. They suggested disclosure on:

n The aspects of the firm’s business or operations that might give rise to materialcybersecurity risks and the related potential costs and consequences

n Where outsourced functions have material cybersecurity risks, descriptions of thosefunctions and how the company addresses those risks

n Risks related to cyber incidents that may remain undetected for an extended periodn Disclosure of cyber incidents experienced by the firm that individually, or in the

aggregate, are material, including the costs and other consequencesn Description of relevant insurance coverage

As our report reveals, during the first wave of disclosures after the SEC’s guidance, there wasa range of responses, even from companies of the same size in the same industry.

Examples of the range of cyber disclosures:9

EXAMPLE #1

Risks facing the company might arise from…the failure to adequately maintain securityand prevent unauthorized access to electronic and other confidential information anddata breaches could materially adversely affect our financial condition and operatingresults.

The firm has become increasingly centralized and dependent upon automated ITprocesses. Furthermore, a portion of our business is done over the Internet, increasingthe risk of viruses that could cause system failures and disruptions of operations. Afailure to maintain the security of our customers’ confidential information, or databelonging to ourselves or our suppliers, could put us at a competitive disadvantage,result in deterioration in our customers’ confidence in us, and subject us to potentiallitigation, liability, fines and penalties, resulting in a possible material adverse impact on our financial condition and results of operations.

Our computers and those of our suppliers are vulnerable to interruption by fire, naturaldisaster, power loss, telecommunications failure, terrorist attacks and acts of war,Internet failures, computer viruses and cyber attacks. The occurrence of any of theseevents could significantly disrupt our operations or result in a significant interruption inthe delivery of our good and services which might harm our reputation and lead to theloss of some of our existing customers as well as impact our ability to compete for new business…

EXAMPLE #2

Risks include…the impact on the firm’s locations and operations due to a terroristattack, cybersecurity threats and other catastrophic events…

10 Willis North America • 08/13

Page 11: The Willis Fortune 1000 Cyber Disclosure Report, 2013

During the first round of financial reporting, companies failing to meet the level ofdisclosure deemed sufficient by the SEC might receive a comment letter from the agency –as has happened to approximately 50 public companies – asking them to supplement oramend their filings where appropriate. http://blog.willis.com/2013/06/cyber-disclosures-of-the-fortune-500-how-companies-rate-their-cyber-exposure-for-the-sec/

OUTSOURCED VENDORS AND THE CLOUDOne of the key areas that the SEC asked companies to address, both in its original guidanceand in its subsequent comment letter, was the potential risk represented by outsourcedvendors. The request seems particularly apt in the context of the balancing act that ITdepartments have to maintain between the costs and benefits of using the “cloud” andoutsourced vendors against the risks of having information and operations in the hands ofthird parties. The exposure may be heightened by the fact that most technology servicecontracts severely limit the ability of companies to recover against vendors after a breach orfailure of systems.

Cloud computing [is] a model for enabling convenient, on-demand network access to ashared pool of configurable computing resources (e.g., networks, servers, storage,applications, and services) that can be rapidly provisioned and released with minimalmanagement effort or service provider interaction.10

– The National Institute of Standards and Technology

Remarkably, only 13% of the companies in the F500 and 12% of companies in the F501-1000mention vendor risk. When they do, the disclosure usually simply mention that the riskexists, but then fails to delve into the functions of the company that may be affected if theoutsourced vendors are breached.

IV. THE FUTUREACTION BY THE FEDERAL GOVERNMENT’S EXECUTIVE BRANCHOn February 12, 2013, President Obama signed a new Executive Order entitled “ImprovingCritical Infrastructure Cybersecurity” which authorizes the dissemination of cyberintelligence reports to owners and operators of certain enterprises.11 It also directs thecollaborative development and implementation of risk-based cybersecurity standards.Recent news from the White House indicates that the administration and the Departmentof Homeland Security (DHS) are considering tax breaks, insurance perks (so farunidentified) and other legal benefits for businesses that make meaningful improvementsto their digital defenses.12

Two types of cyber intelligence can be delivered to companies:

(1) Reports of cyber threats to the U.S. homeland that identify a specific targeted entity

(2) Reports which identify critical infrastructure “where a Cybersecurity incident couldreasonably result in catastrophic regional or national effects on public health or safety,economic security, or national security.”

11 Willis North America • 08/13

Page 12: The Willis Fortune 1000 Cyber Disclosure Report, 2013

It appears that any company that receives a DHS report is on notice that the DHS expects the company toreinforce their resilience to cyber attacks, develop capabilities for informing themselves on when and wherean attack may occur and managing the crises. Access to intelligence reports may be a two-edged sword.

CURRENT ACTION BY THE OF THE FEDERAL GOVERNMENT (SEC)SEC Chairman Mary Jo White recently asked her staff to evaluate the SEC’s current guidance forcybersecurity disclosures and to consider whether more stringent requirements are necessary.13 Senator JayRockefeller, who has encouraged the SEC to provide further guidance on cybersecurity disclosures and was atthe forefront of the SEC’s initial guidance,14 was told in the letter, dated May 1, that the SEC Chair believesthat the initial guidance to companies on cybersecurity “has had a positive impact” on better informing thestakeholders of public companies.15 Our study on the initial response by the largest U.S. public companiesseems to confirm this while suggesting that some improvements may be possible.

V. NEXT STEPSAction taken at the federal level clearly shows that cybersecurity disclosure by public companies is high onthe federal agenda and will continue to pose a unique challenge for public companies. Governmentauthorities may require companies to step out of their comfort zone for disclosures in order to bolster ITsecurity for the entire U.S., opening up greater liability to directors and officers in the process. To protectthemselves, companies may want to be more open and detailed in the way that they describe cyber risks intheir public documents; but this could also play against them if they reveal a large exposure and only limitedresources to protect themselves.

Meanwhile, we are working on a series of separate, more in-depth industry profiles on the unique cyberdisclosures of the Fortune 1,000.

1 http://commerce.senate.gov/public/?a=Files.Serve&File_id=4ceb6c11-b613-4e21-92c7-a8e1dd5a707e2 Securities and Exchange Commission, CF DisclosuF Disclosure Guidance, Topic No. 2: Cybersecurity, October 13, 2011 ,

http://www.sec.gov/divisions/corpfin/guidance/cfguidance-topic2.htm3 http://www.whitehouse.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-

infrastructure-security-and-resil, February 12, 2013.4 Critical infrastructure sectors such as the government facilities sector and commercial facilities sector are two

examples of sectors not well represented (or present at all) in the Fortune 1,000.5 http://www.dhs.gov/communications-sector 6 http://www.dhs.gov/healthcare-and-public-health-sector7 E.g., there are only eight companies in the life sciences group, all of which disclose some level of cyber risk.8 This is concerning as the group includes many non-tech vendors for large corporations.9 Please note that these examples have been modified from actual disclosures. 10 http://info.apps.gov/content/what-cloud11 http://www.politico.com/story/2013/07/white-house-considers-breaks-for-boosting-cybersecurity-

94528.html 12 Incentives to Support Adoption of the Cybersecurity Framework at

http://m.whitehouse.gov/blog/2013/08/06incentives-support-adoption-cybersecurity-framework13 SEC Chairman Reviewing Company Cybersecurity Disclosures, May 13, 2013 3:01 PM ET,

http://www.bloomberg.com/news/2013-05-13/sec-chairman-reviewing-company-cybersecurity-disclosures.html

14 http://www.rockefeller.senate.gov/public/index.cfm/press-releases?ID=134e9dd2-9b6c-49c2-bcff-073019bcd247

15 “SEC Head Orders Review Of Cyberthreat Disclosure Guidance,” May 14, 2013http://www.law360.com/articles/441415/sec-head-orders-review-of-cyberthreat-disclosure-guidance

12 Willis North America • 08/13