Te c h n o l o g y T r e n d s a n d I s s u e s

Size: px
Start display at page:

Download "Te c h n o l o g y T r e n d s a n d I s s u e s"

Transcription

1 Te c h n o l o g y T r e n d s a n d I s s u e s IMPACT 2015 Accordant Client Conference Ken Fishkin, MCSE, CISSP Director - CohnReznick Advisory Group

2 W E L C O M E K e n F i s h k i n, M C S E, V C P, C I S M, C I S S P, CEH D i r e c t o r - Infrastructure M a n a g e m e n t CohnReznick A d v i s o r y Group Ken is a director in the Firm s Management and Technology Consulting Practice and specializes in infrastructure and security assessments, as well as hardware selection and implementation. He has over 16 years experience and manages a wide-array of company infrastructures across various industries.

3 C o n t e x t a n d B a c k g r o u n d

4 I T T R A N S F O R M A T I O N

5 T H E S P E E D O F B U S I N E S S T O D A Y Over 50% of US population owns a smartphone 10 billion mobiles devices will be in use by billion s are sent every day Over 1 billion Google searches every day Trillions of sensors, monitors track and communicate with each other over the Internet 30 petabytes of user-generated data stored, accessed and analyzed 230 million tweets a day Source: IBM

6 T E C H N O L O G Y A D O P T I O N L I F E C Y C L E Level 0: Enthusiasts Level 1: Visionaries Level 2: Pragmatists Level 3: Conservatives Level 4: Skeptics 0-2.5% adoption % adoption 16-50% adoption 50-84% adoption % adoption

7 T O P T E C H N O L O G Y - R E L A T E D T R E N D S F O R

8 D I S R U P T I V E T E C H N O L O G Y When an innovation or event creates a new market or disrupts an existing market and a way of doing business.

9 D R O N E S A R E B E C O M I N G I N T E G R A L I N C O N S T R U C T I O N I N D U S T R Y

10 W O R L D S F I R S T 3 D P R I N T E D V I L L A

11 W H A T I S T H E I N T E R N E T O F T H I N G S ( I o T )? (IoT) vendors will earn more than $309 billion by 2020.

12 B i g D a t a

13 L O W E R I N G T H E C O S T O F C U R I O S I T Y Source: IBM

14 DATA ANALYSIS TODAY

15 M A I N B I G D A T A C H A R A C T E R I S I C S

16 D A S H B O A R D E X A M P L E

17 K E Y D R I V E R S I N B I G D A T A Business Opportunity to enable innovative new business models Provide new insights that could potentially drive competitive advantage Technical Data collected and stored continues to grow exponentially Data is increasingly everywhere and in many formats Traditional solutions cannot meet new requirements Financial Increasing cost of maintaining data systems as a percentage of IT spend Cost advantages of cloud solutions

18 B I G D A T A / A D V A N C E D A N A L Y T I C S Investment in Big Data Percentage of Respondents (N=1,210) Source: Gartner Big Data Adoption Survey (Sept. 2013) Have invested Plan to w/in 1-2 years No plans 90% of the world s data was created in the last two years. 80% of the world s data is unstructured. 1 in 2 business leaders don t have access to data they need. 83% of CIO s cited Big Data and Analytics as part of their visionary plan. 54% of all companies use analytics for competitive advantage. Source: IBM 2013 meta analysis of BI trends and surveys

19 C l o u d C o m p u t i n g

20 T H E C L O U D

21 C L O U D C O M P U T I N G In 2015: 50% of all independent software vendors will be pure SaaS providers. In 2015: 90% of private cloud computing deployments will be for infrastructure as a service. By 2017: 5% of all IT job turnover will be due to Cloud Computing. The future of IT lies in acting as a service broker to a hybrid solution [involving cloud computing]. Source: Gartner 2014 Cloud Computing Key Initiative Overview

22 E X A M P L E O F I A A S

23 E X A M P L E O F P A A S

24 O F F I C E A C L O U D T E C H N O L O G Y F O R T H E M A S S E S

25 F O C U S O N C O R E C O M P E T E N C I E S Leave the plumbing to the experts Focus on the business instead of managing IT

26 T O P U S E S F O R T H E C L O U D Web Hosting 47% Content Filtering 82% < 100 Employees 42% Backup / Recovery Hosting 58% 46% Productivity Solutions

27 C L O U D A D O P T I O N K E Y B E N E F I T S

28 T H E D A R K S I D E O F T H E C L O U D Is my data secure? How often do we backup data? How can I recover lost data? Am I compliant with applicable regulations (HIPAA, SOX, etc.) What if I lose connectivity? What is the performance? What if I need to customize? What if the vendor files for bankruptcy?

29 A D D I T I O N A L C L O U D R I S K S Offers less legal protection: data in the cloud is subject to a lower legal standard in terms of search and seizure. You don t own the hardware: Conducting a vulnerability scan or a penetration test requires the explicit permission of the cloud. Cybersecurity insurance may not be applicable. Strong policies and user education required: New business model requires users to understand risks and benefits of the Cloud. Who ya gonna call: Does the cloud provider have an adequate support structure? Costs: While generally a cost saver, you need to know exactly what is covered and how much for additional requirements (data storage, processing power, usage, etc.)

30 IMPACT ON THE CONSTRUCTION INDUSTRY More construction companies are allowing data in the cloud yet only 36.9% of companies have cloud security policies in place to protect that data. Even fewer companies are able to integrate any of their data across independent cloud solutions. Source: JBKnowledge

31 M o b i l e C o m p u t i n g

32 C L O U D + M O B I L E = P E R F O R M A N C E Old Enterprise New Enterprise

33 M I C R O S O F T A N D M O B I L E C O M P U T I N G Microsoft is taking the offensive in mobile productivity

34 M O B I L E C O M P U T I N G O N T H E R I S E

35 The unexpected consequence of bring your own device (BYOD) programs is a doubling or even tripling of the size of the mobile workforce. This is placing tremendous strain on IT and Finance organizations. Source: Gartner 2014 IT Trends Report

36 M O B I L I N G C O M P U T I N G

37 C y b e r s e c u r i t y

38 T O D A Y S R E A L I T I E S 1 in 5 of all organizations have experienced a cyber attack 8 Months is the time an advanced threat goes unnoticed on a victim s network 2.5 Billion exposed records as a result of data breaches in the last 5 years 62% increase in breaches in 2013 From January 2012 to June 2014, 75% of reported data breaches have occurred at small and mid-sized organizations Sources: Forbes Business Insider, ISACA Global Security Analysis & 2014 Verizon Data Breach Report

39

40 C U R R E N T S O C I A L E N G I N E E R I N G A T T A C K M E T H O D S Ransomware Phishing / Spear phishing Quid pro quo Tailgating Dumpster Diving Shoulder surfing

41 H A C K I N G I N D U S T R I A L C O N T R O L S Y S T E M S BLAST FURNACE COULD NOT BE SHUT DOWN ATTACKER STOLE PASSWORDS VIA SPEAR PHISHING SECOND ATTACK TO AFFECT INDUSTRIAL SYSTEMS ILLUSTRATES NEED TO SEPARATE PRODUCTION FROM BUSINESS SYSTEMS

42

43 H O W T O A V O I D B E I N G T H E N E X T T A R G E T ( P U N I N T E N D E D ) Know your information assets Don t boil the ocean with security controls do the basics and do them well: Patch management Good authentication Perimeter security Malware and anti-virus Security awareness and training!!! Don t forget these blocking & tackling IT controls: Backups Periodic vulnerability / security assessments Monitoring of logs Response plan is critical Security begins with Governance

44 C L O S I N G T H O U G H T Generals spend too much time preparing for the last war rather than the next one Georges Clemenceau, French Statesman who lead the nation in WWI We only need to be lucky once. You need to be lucky every time. - The IRA to Margaret Thatcher Security is always excessive until it's not enough. - Robbie Sinclair, Head of Security, Country Energy, NSW Australia "The condition of any backup is unknown until a restore is attempted. - Unknown

45 T H A N K Y O U Ken Fishkin, MCSE, VCP, CISM, CISSP, CEH Director of Infrastructure Management CohnReznick Advisory Group Tel: Ken.Fishkin@CohnReznick.com

Cyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby

Cyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby Cyberinsurance: Necessary, Expensive and Confusing as Hell Presenters: Sharon Nelson and Judy Selby Setting the stage 2018 report from PwC one-third of US businesses have some form of cyberinsurance PwC

More information

Privacy Liability & Data Breach Management Cyber Insurance as a Customer Privacy Protection Tool

Privacy Liability & Data Breach Management Cyber Insurance as a Customer Privacy Protection Tool Privacy Liability & Data Breach Management Cyber Insurance as a Customer Privacy Protection Tool Nikos Georgopoulos Cyber Risks Advisor - cyrm Nikos Georgopoulos Microsoft Insurance Conference March 2015

More information

Sara Robben, Statistical Advisor National Association of Insurance Commissioners

Sara Robben, Statistical Advisor National Association of Insurance Commissioners Moderated by Daniel Eliot, Director Small Business Programs National Cyber Security Alliance Sara Robben, Statistical Advisor National Association of Insurance Commissioners Angela Gleason, Senior Counsel

More information

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report

More information

ACORD 834 (2014/12) - Cyber and Privacy Coverage Section

ACORD 834 (2014/12) - Cyber and Privacy Coverage Section ACORD 834 (2014/12) - Cyber and Privacy Coverage Section ACORD 834, Cyber and Privacy Coverage Section, is used to apply for cyber and privacy coverage. The form was designed to be used in conjunction

More information

CYBER RISK INSURANCE. Proposal Form

CYBER RISK INSURANCE. Proposal Form CYBER RISK INSURANCE Proposal Form 2 Cyber Risk Insurance Cyber Risk Insurance Proposal Form Broker Name of Proposer Company number Charity Registration number Business Description Registered Address Post

More information

Surprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their

Surprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their When It Comes to Data Breaches, Why Are Corporations Largely Uninsured? Under Attack and Unprepared: Argo Group Cyber Insurance Survey 2017 Surprisingly, only 40 percent of small and medium-sized enterprises

More information

2017 Cyber Security and Data Privacy Study

2017 Cyber Security and Data Privacy Study RESEARCH REPORT DECEMBER 2017 2017 Cyber Security and Data Privacy Study How does your company compare? TABLE OF CONTENTS 05 How does your company compare? 06 Key findings 08 Cyber security and data privacy

More information

Chubb Cyber Enterprise Risk Management

Chubb Cyber Enterprise Risk Management Chubb Cyber Enterprise Risk Management Fact Sheet Financial Lines Chubb Cyber Enterprise Risk Management When it comes to a data security breach or privacy loss, it isn t a matter of if it will happen

More information

CAPITAL WORKPAPERS TO PREPARED DIRECT TESTIMONY OF GAVIN H. WORDEN ON BEHALF OF SOUTHERN CALIFORNIA GAS COMPANY BEFORE THE PUBLIC UTILITIES COMMISSION

CAPITAL WORKPAPERS TO PREPARED DIRECT TESTIMONY OF GAVIN H. WORDEN ON BEHALF OF SOUTHERN CALIFORNIA GAS COMPANY BEFORE THE PUBLIC UTILITIES COMMISSION Application of SOUTHERN CALIFORNIA GAS COMPANY for authority to update its gas revenue requirement and base rates effective January 1, 219 (U 94-G) ) ) ) ) Application No. 17-1- Exhibit No.: (SCG-27-CWP)

More information

Cyber ERM Proposal Form

Cyber ERM Proposal Form Cyber ERM Proposal Form This document allows Chubb to gather the needed information to assess the risks related to the information systems of the prospective insured. Please note that completing this proposal

More information

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage James P. Bobotek james.bobotek@pillsburylaw.com (202) 663-8930 Pillsbury Winthrop Shaw Pittman LLP DOCUMENT

More information

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017 You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business

More information

Cyber-Insurance: Fraud, Waste or Abuse?

Cyber-Insurance: Fraud, Waste or Abuse? SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major

More information

SECURITY POLICY 1. Security of Services. 2. Subscriber Security Administration. User Clearance User Authorization User Access Limitations

SECURITY POLICY 1. Security of Services. 2. Subscriber Security Administration. User Clearance User Authorization User Access Limitations ! SECURITY POLICY This Security Policy ( Policy ) applies to all Services provided by Collective Medical Technologies, Inc. ( CMT ) pursuant to a Master Subscription Agreement ( Underlying Agreement )

More information

An Overview of Cyber Insurance at AIG

An Overview of Cyber Insurance at AIG An Overview of Cyber Insurance at AIG Michael Lee, MBA Cyber Business Development Manager AIG 2018 Brittney Mishler, ARM Cyber Casualty Underwriting Specialist AIG Cyber Insurance It s a peril, not a product

More information

Insuring your online world, even when you re offline. Masterpiece Cyber Protection

Insuring your online world, even when you re offline. Masterpiece Cyber Protection Insuring your online world, even when you re offline Masterpiece Cyber Protection Protect your online information from being an open network 97% of Chubb clients who had a claim paid were highly satisfied

More information

Cyber Risks & Insurance

Cyber Risks & Insurance Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of

More information

PRIVACY AND CYBER SECURITY

PRIVACY AND CYBER SECURITY PRIVACY AND CYBER SECURITY Presented by: Joe Marra, Senior Account Executive/Producer Stoya Corcoran, Assistant Vice President Presented to: CIFFA Members September 20, 2017 1 Disclaimer The information

More information

HIPAA AND YOU 2017 G E R A L D E MELTZER, MD MSHA

HIPAA AND YOU 2017 G E R A L D E MELTZER, MD MSHA HIPAA AND YOU 2017 G E R A L D E MELTZER, MD MSHA ALLISON SHUREN, J D, MSN Financial Disclosure Gerald Meltzer is a consultant for imedicware Allison Shuren co-chairs the Life Sciences and Healthcare Regulatory

More information

VDC SLA Annex Additional Terms for Virtual Data Centre - SLAs

VDC SLA Annex Additional Terms for Virtual Data Centre - SLAs CONTENTS 1 Introduction... 2 2 Availability Level Objective Calculation... 2 3 Compute Platform on VDC... 2 3.1 Availability Level... 2 4 Storage Platform on VDC... 3 4.1 Availability Level... 3 4.2. Snapshot

More information

T A B L E of C O N T E N T S

T A B L E of C O N T E N T S INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015

More information

Privacy and Data Breach Protection Modular application form

Privacy and Data Breach Protection Modular application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

Evaluating Your Company s Data Protection & Recovery Plan

Evaluating Your Company s Data Protection & Recovery Plan Evaluating Your Company s Data Protection & Recovery Plan CBIA Cybersecurity Webinar Series 11AM 12PM Part V. Presented by: Stewart Tosh Charles Bellingrath Date: December 7, 2017 Today s presenters Stewart

More information

The Internet of Everything: Building Cyber Resilience in a Connected World

The Internet of Everything: Building Cyber Resilience in a Connected World The Internet of Everything: Building Cyber Resilience in a Connected World The Internet of Things (IoT) is everywhere, ushering in a technological revolution at lightning speed. According to an Oliver

More information

Cyber, Data Risk and Media Insurance Application form

Cyber, Data Risk and Media Insurance Application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

MEASURING & PRICING THE COST DRIVERS OF A CYBER SECURITY RISK EVENT

MEASURING & PRICING THE COST DRIVERS OF A CYBER SECURITY RISK EVENT MEASURING & PRICING THE COST DRIVERS OF A CYBER SECURITY RISK EVENT IOWA ACTUARIES CLUB 2/25/16 EDUCATION DAY PRESENTED BY KEITH BURKHARDT, V.P. KRAUS-ANDERSON INSURANCE Overview I. Why are cyber security

More information

Cyber Liability Insurance. Data Security, Privacy and Multimedia Protection

Cyber Liability Insurance. Data Security, Privacy and Multimedia Protection Cyber Liability Insurance Data Security, Privacy and Multimedia Protection Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such

More information

ANALYSIS & ASSESSMENT OF TECHNOLOGY FROM A BOARD S PERSPECTIVE STEPHANIE L. BUCKLEW SLB CONSULTING

ANALYSIS & ASSESSMENT OF TECHNOLOGY FROM A BOARD S PERSPECTIVE STEPHANIE L. BUCKLEW SLB CONSULTING ANALYSIS & ASSESSMENT OF TECHNOLOGY FROM A BOARD S PERSPECTIVE STEPHANIE L. BUCKLEW SLB CONSULTING WHAT IS TECHNOLOGY RISK? Any threat to information technology within your organization and the consequence

More information

Sponsored by. Is Your Data Safe? The 2016 Financial Adviser Cybersecurity Assessment

Sponsored by. Is Your Data Safe? The 2016 Financial Adviser Cybersecurity Assessment Sponsored by Is Your Data Safe? The 2016 Financial Adviser Cybersecurity Assessment Table of Contents Welcome 3 Executive Summary 4 Introduction and Methodology 6 Preparation and Readiness 8 - Client Awareness

More information

IT Risk in Credit Unions - Thematic Review Findings

IT Risk in Credit Unions - Thematic Review Findings IT Risk in Credit Unions - Thematic Review Findings January 2018 Central Bank of Ireland Findings from IT Thematic Review in Credit Unions Page 2 Table of Contents 1. Executive Summary... 3 1.1 Purpose...

More information

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION NOTICE: THIS APPLICATION IS FOR CLAIMS-MADE AND REPORTED COVERAGE, WHICH APPLIES ONLY TO CLAIMS FIRST MADE AND REPORTED IN WRITING DURING THE POLICY PERIOD, OR ANY EXTENDED REPORTING PERIOD. THE LIMIT

More information

MANAGING DATA BREACH

MANAGING DATA BREACH MANAGING DATA BREACH Beazley is a specialist insurer and leading provider of cyber insurance. Michael Phillips is a Claims Manager in the Technology, Media, and Business division of Beazley, and focuses

More information

Picking Stocks in the Tech Sector

Picking Stocks in the Tech Sector Picking Stocks in the Tech Sector April 20, 2015 by Chaitanya Yaramada of Robert W. Baird & Co. Any science or technology which is sufficiently advanced is indistinguishable from magic. Arthur C. Clarke

More information

HEALTHCARE BREACH TRIAGE

HEALTHCARE BREACH TRIAGE IAPP Privacy Academy September 30 October 2, 2013 HEALTHCARE BREACH TRIAGE Theodore P. Augustinos EDWARDS WILDMAN PALMER LLP Kenneth P. Mortensen CVS/CAREMARK 2013 Edwards Wildman Palmer LLP & Edwards

More information

Cyber COPE. Transforming Cyber Underwriting by Russ Cohen

Cyber COPE. Transforming Cyber Underwriting by Russ Cohen Cyber COPE Transforming Cyber Underwriting by Russ Cohen Business Descriptor How tall is your office building? How close is the nearest fire hydrant? Does the building have an alarm system? Insurance companies

More information

Cyber Risk Quantification: Translating technical risks into business terms

Cyber Risk Quantification: Translating technical risks into business terms Cyber Risk Quantification: Translating technical risks into business terms Jesper Sachmann RSA Denmark 13-06-2018 1 CYBER RISK QUANTIFICATION: TRANSLATING TECHNICAL RISKS INTO BUSINESS TERMS Jesper Sachmann

More information

Cyber Liability & Data Breach Insurance Nikos Georgopoulos Oracle Security Executives Breakfast 23 April Cyber Risks Advisor

Cyber Liability & Data Breach Insurance Nikos Georgopoulos Oracle Security Executives Breakfast 23 April Cyber Risks Advisor Cyber Liability & Data Breach Insurance Nikos Georgopoulos Oracle Security Executives Breakfast 23 April 2013 Cyber Risks Advisor 1 Contents Information Age Directive On Network and Information Security

More information

At the Heart of Cyber Risk Mitigation

At the Heart of Cyber Risk Mitigation At the Heart of Cyber Risk Mitigation De-risking Cyber Threats with Insurance Vikram Singh Abstract Management of risks is an integral part of the insurance industry. Companies have succeeded in identifying

More information

Bank of America Merrill Lynch Future of Financials Conference 2018

Bank of America Merrill Lynch Future of Financials Conference 2018 Bank of America Merrill Lynch Future of Financials Conference 2018 Jason Witty EVP, Chief Information Security Officer November 5, 2018 U.S. BANCORP Forward-looking Statements and Additional Information

More information

The Importance of Speed in Cyber Underwriting. Sponsored By:

The Importance of Speed in Cyber Underwriting. Sponsored By: The Importance of Speed in Cyber Underwriting Sponsored By: The Importance of Speed in Cyber Underwriting Visit www.advisenltd.com at the end of this webinar to download: Copy of these slides Recording

More information

Cyber Incident Response When You Didn t Have a Plan

Cyber Incident Response When You Didn t Have a Plan Cyber Incident Response When You Didn t Have a Plan April F. Doss Saul Ewing LLP How serious is the cybersecurity threat? Some sobering numbers from 2015: Over half a billion personal records were stolen

More information

A GUIDE TO CYBER RISKS COVER

A GUIDE TO CYBER RISKS COVER A GUIDE TO CYBER RISKS COVER Cyber risk the daily business threat to SMEs Cyber risks and data security breaches are a daily threat to everyday business. Less than 10% of UK companies have cyber insurance

More information

A Review of Actual Fraud Cases in 2017 FRAUD REVIEW

A Review of Actual Fraud Cases in 2017 FRAUD REVIEW A Review of Actual Fraud Cases in 2017 FRAUD REVIEW Contents Introduction 3 Fraud Snapshot 4 Case Studies Credit Card Fraud 5 Business Email Compromise Fraud 6 Payroll Fraud 7 Supplier Fraud 8 Outlook

More information

- Digital Tax Administration System -

- Digital Tax Administration System - 41 st World Continuous Auditing & Reporting Symposium University de Huelva, Spain November 9-10, 2017 - Digital Tax Administration System - Presented by: Vinod Kashyap NextGen Knowledge Solutions Private

More information

The working roundtable was conducted through two interdisciplinary panel sessions:

The working roundtable was conducted through two interdisciplinary panel sessions: As advancements in technology enhance productivity, develop new businesses and enhance economic growth, malicious actors continue to advance as well, seeking to exploit technology for any number of criminal

More information

Matrix announces the results of the second quarter of 2017

Matrix announces the results of the second quarter of 2017 Matrix announces the results of the second quarter of 2017 Revenues increased by about 12% to approximately NIS 1.36B; operating profit increased by about 6% to approximately NIS 89.6M, and revenues in

More information

Your defence toolkit. How to combat the cyber threat

Your defence toolkit. How to combat the cyber threat Your defence toolkit How to combat the cyber threat Contents The threat of cyber crime 4 How UK businesses are targeted 6 Case studies 8 Why cyber security is so important to manufacturers now 10 The

More information

Cisco Insurance Whitepaper Fall 2016

Cisco Insurance Whitepaper Fall 2016 White Paper Cisco Insurance Whitepaper Fall 2016 Technology Helps Insurers Unleash the Possibilities of Digitization It s no secret that InsureTech investment is on the rise. According to the Pulse of

More information

Cyber-risk and cyber-controls:

Cyber-risk and cyber-controls: Cyber-risk and cyber-controls: 1 Insurance alone is not enough Cyber-risk has become one of the most significant topics in boardrooms around the world. The threat is indeed, very real. Consequently, in

More information

Blockchain: The New Line of Defense

Blockchain: The New Line of Defense Blockchain: The New Line of Defense Who Am I Your Presenter & Advisory in This Domain q Cybersecurity Solutions Architect for Enterprise & National Level Projects for Kaspersky Lab Middle East, Turkey

More information

Claims Made Basis. Underwritten by Underwriters at Lloyd s, London

Claims Made Basis. Underwritten by Underwriters at Lloyd s, London APPLICATION for: NetGuard Plus Claims Made Basis. Underwritten by Underwriters at Lloyd s, London tice: The Policy for which this Application is made applies only to Claims made against any of the Insureds

More information

HACK CASE. Investment ETFMG PRIME CYBER SECURITY ETF

HACK CASE. Investment ETFMG PRIME CYBER SECURITY ETF HACK TM Investment CASE ETFMG PRIME CYBER SECURITY ETF The ETFMG Prime Cyber Security ETF gives you exposure to over 40 companies that provide cyber security and data protection services to protect governments,

More information

The Connected Home: Trends and Implications for Insurers. CAS Centennial Celebration November 10-11, 2014

The Connected Home: Trends and Implications for Insurers. CAS Centennial Celebration November 10-11, 2014 The Connected Home: Trends and Implications for Insurers CAS Centennial Celebration November 10-11, 2014 Antitrust notice The Casualty Actuarial Society is committed to adhering strictly to the letter

More information

Add our expertise to yours Protection from the consequences of cyber risks

Add our expertise to yours Protection from the consequences of cyber risks CyberEdge THIS INFORMATION IS INTENDED FOR INSURANCE BROKERS AND OTHER INSURANCE PROFESSIONALS ONLY Add our expertise to yours Protection from the consequences of cyber risks What is CyberEdge? 2 CyberEdge

More information

For personal use only

For personal use only 30 April 2018 ASX Announcement / Media Release Quarterly Report for Period Ending 31 March 2018 HIGHLIGHTS Cash Receipts building with +9.2% increase on previous quarter. Developing opportunities in IoT

More information

41% of respondents see cybercrime as the most significant risk over the next 24 months.

41% of respondents see cybercrime as the most significant risk over the next 24 months. Economic Crime and Fraud Survey 2018 Swiss insights Down but not out: Swiss fraudsters are digitalising and diversifying 3 of Swiss organisations experienced fraud and/or economic crime. 41% of respondents

More information

Your Guide to Business Asset Protection

Your Guide to Business Asset Protection Your Guide to Business Asset Protection Imagine finding yourself on the wrong end of a costly judgment in a lawsuit. Or re-building your business after a destructive natural disaster. Potentially worse,

More information

Cyber Insurance I don t think it means what you think it means

Cyber Insurance I don t think it means what you think it means SESSION ID: GRC-T10 Cyber Insurance I don t think it means what you think it means John Loveland Global Head of Cyber Security Strategy & Marketing Verizon Enterprise Solutions Plot A brief history of

More information

Formulating Your Business Continuity Plan. ds-inc.com (609)

Formulating Your Business Continuity Plan. ds-inc.com (609) Formulating Your Business Continuity Plan ds-inc.com (609) 655 1707 Formulating Your Business Continuity Plan The first step to protecting your business from any negative setbacks is creating a systematic

More information

APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London

APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London SECTION I. GENERAL INFORMATION 1. Name of Applicant: Physical Address: (as it should appear

More information

HIPAA Compliance Guide

HIPAA Compliance Guide This document provides an overview of the Health Insurance Portability and Accountability Act (HIPAA) compliance requirements. It covers the relevant legislation, required procedures, and ways that your

More information

A broker guide to selling cyber insurance. CyberEdge Sales Playbook

A broker guide to selling cyber insurance. CyberEdge Sales Playbook A broker guide to selling cyber insurance CyberEdge Sales Playbook IN 5 Cyber is consistently one of the top three risks businesses face, with the average cost of a breach at approximately $4.3 million.

More information

THE CPA AUSTRALIA ASIA-PACIFIC SMALL BUSINESS SURVEY 2017

THE CPA AUSTRALIA ASIA-PACIFIC SMALL BUSINESS SURVEY 2017 THE CPA AUSTRALIA ASIA-PACIFIC SMALL BUSINESS SURVEY GENERAL REPORT FOR AUSTRALIA, MAINLAND CHINA, HONG KONG, INDONESIA, MALAYSIA, NEW ZEALAND, SINGAPORE AND VIETNAM Legal notice CPA Australia Ltd ( CPA

More information

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do ARTICLE Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do By Gene Griggs and Saad Gul This article analyzes cybersecurity issues for retirement plans. Introduction

More information

Construction. Industry Advisor. Fall Year end tax planning for construction companies. How to self-insure your construction business

Construction. Industry Advisor. Fall Year end tax planning for construction companies. How to self-insure your construction business Construction Industry Advisor Fall 2015 Year end tax planning for construction companies How to self-insure your construction business Cost segregation studies can benefit you and your clients Contractor

More information

SUMMARY. Risk Level *

SUMMARY. Risk Level * February 06, 2015 Symantec Corporation Current Recommendation Earnings Update: Symantec Reports Q3 Results SUMMARY DATA NEUTRAL Prior Recommendation Outperform Date of Last Change 04/14/2013 Current Price

More information

Cyber & Privacy Liability and Technology E&0

Cyber & Privacy Liability and Technology E&0 Cyber & Privacy Liability and Technology E&0 Risks and Coverage Geoff Kinsella Partner http://map.norsecorp.com http://www.youtube.com/watch?v=f7pyhn9ic9i Presentation Overview 1. The Cyber Evolution 2.

More information

CRISP Portal Guide for Practices. CRISP Maryland s Health Information Exchange

CRISP Portal Guide for Practices. CRISP Maryland s Health Information Exchange CRISP Portal Guide for Practices CRISP Maryland s Health Information Exchange 1 Contents Introduction... 3 Particpitation Agreement FAQ... 4 Notice of Privacy Practice Sample... 12 Patient Education...

More information

Vaco Cyber Security Panel

Vaco Cyber Security Panel Vaco Cyber Security Panel ISACA Charlotte Chapter December 5 th, 2017 Vaco is an international talent solutions firm headquartered in Nashville, Tennessee, with more than 35 locations around the globe.

More information

INFORMATION AND CYBER SECURITY POLICY V1.1

INFORMATION AND CYBER SECURITY POLICY V1.1 Future Generali 1 INFORMATION AND CYBER SECURITY V1.1 Future Generali 2 Revision History Revision / Version No. 1.0 1.1 Rollout Date Location of change 14-07- 2017 Mumbai 25.04.20 18 Thane Changed by Original

More information

Privacy and Security Issues Facing Qualified Retirement Plans

Privacy and Security Issues Facing Qualified Retirement Plans SECURIAN FINANCIAL 1 Privacy and Security Issues Facing Qualified Retirement Plans Theodore Schmelzle, JD, CIPP/US Senior Director, Retirement Solutions November 2018 SECURIAN FINANCIAL 2 Agenda Why advisors,

More information

Company Overview. August 6, 2018

Company Overview. August 6, 2018 Company Overview August 6, 2018 This presentation contains forward-looking statements. All statements contained in this presentation other than statements of historical facts, including, without limitation,

More information

Small business, big risk: Lack of cyber insurance is a serious threat

Small business, big risk: Lack of cyber insurance is a serious threat Small business, big risk: Lack of cyber insurance is a serious threat October 2018 Sean Kevelighan Chief Executive Officer seank@iii.org James Lynch, FCAS, MAAA Chief Actuary jamesl@iii.org Jessica McGregor

More information

NZI LIABILITY CYBER. Are you protected?

NZI LIABILITY CYBER. Are you protected? NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is

More information

Q PRESENTATION 7 FEBRUARY 2018

Q PRESENTATION 7 FEBRUARY 2018 Q4 2017 PRESENTATION 7 FEBRUARY 2018 Highlights Q4 2017 Record high revenue, operating profit, and cash flow from operations REVENUE of NOK 10.0 billion (up 10.1%) Change in currency rates positively impacts

More information

ARE YOU HIP WITH HIPAA?

ARE YOU HIP WITH HIPAA? ARE YOU HIP WITH HIPAA? Scott C. Thompson 214.651.5075 scott.thompson@haynesboone.com February 11, 2016 HIPAA SECURITY WHY SHOULD I CARE? Health plan fined $1.2 million for HIPAA breach. Health plan fined

More information

CHECK POINT SOFTWARE TECHNOLOGIES REPORTS 2017 FOURTH QUARTER AND FULL YEAR FINANCIAL RESULTS

CHECK POINT SOFTWARE TECHNOLOGIES REPORTS 2017 FOURTH QUARTER AND FULL YEAR FINANCIAL RESULTS INVESTOR CONTACT: MEDIA CONTACT: Kip E. Meintzer Adolph Hunter Check Point Software Technologies Check Point Software Technologies +1.650.628.2040 +1.650.628.2260 ir@checkpoint.com press@checkpoint.com

More information

Company Overview. February 12, 2018

Company Overview. February 12, 2018 Company Overview February 12, 2018 This presentation contains forward-looking statements. All statements contained in this presentation other than statements of historical facts, including, without limitation,

More information

COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6

COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6 1. Procedure Title: PCI Compliance Program COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6 2. Procedure Purpose and Effect: All Colorado State University departments that accept credit/debit

More information

THE GENERAL DATA PROTECTION REGULATION

THE GENERAL DATA PROTECTION REGULATION THE GENERAL DATA PROTECTION REGULATION IMPLICATIONS FOR ORGANISATIONS IN THE MIDDLE EAST The General Data Protection Regulation (GDPR) is a major revision to data protection laws in the EU and has potential

More information

HIPAA PRIVACY AND SECURITY AWARENESS

HIPAA PRIVACY AND SECURITY AWARENESS HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect

More information

Cyber Security Insurance Proposal Form

Cyber Security Insurance Proposal Form Cyber Security Insurance Proposal Form This proposal must be completed and signed by a Principal, Partner or Director of the Proposer. The person completing and signing the form should be authorised by

More information

2015 EMEA Cyber Impact Report

2015 EMEA Cyber Impact Report Published: June 2015 2015 EMEA Cyber Impact Report The increasing cyber threat what is the true cost to business? Research independently conducted by Ponemon Institute LLC and commissioned by Aon Risk

More information

Cyber ERM Proposal Form

Cyber ERM Proposal Form Cyber ERM Proposal Form This document allows Chubb to gather the needed information to assess the risks related to the information systems of the prospective insured. Please note that completing this proposal

More information

Brought to you by Physicians Insurance A Mutual Company April 24, 2012 Presented by: Chris Apgar, CISSP

Brought to you by Physicians Insurance A Mutual Company April 24, 2012 Presented by: Chris Apgar, CISSP Risk Analysis & Meaningful Use Brought to you by Physicians Insurance A Mutual Company April 24, 2012 Presented by: Chris Apgar, CISSP Today s Webinar All participant lines are muted. If you have questions,

More information

Protecting Against the High Cost of Cyberfraud

Protecting Against the High Cost of Cyberfraud Protecting Against the High Cost of Cyberfraud THE ROLE OF CYBER LIABILITY INSURANCE IN YOUR RISK MANAGEMENT STRATEGY Paying the Price...2 The Ransomware Scourge...3 Policy Provisions...3 Management Liability...4

More information

Cyber Risk Proposal Form

Cyber Risk Proposal Form Cyber Risk Proposal Form Company or trading name Address Postcode Country Telephone Email Website Date business established Number of employees Do you have a Chief Privacy Officer (or Chief Information

More information

TTCU FEDERAL CREDIT UNION

TTCU FEDERAL CREDIT UNION TTCU FEDERAL CREDIT UNION ONLINE BANKING AGREEMENT & DISCLOSURES 1. Introduction. This Agreement is the contract which covers your and our rights and responsibilities concerning Online Banking ("Online

More information

APPLICATION FOR DATA BREACH AND PRIVACY LIABILITY, DATA BREACH LOSS TO INSURED AND ELECTRONIC MEDIA LIABILITY INSURANCE

APPLICATION FOR DATA BREACH AND PRIVACY LIABILITY, DATA BREACH LOSS TO INSURED AND ELECTRONIC MEDIA LIABILITY INSURANCE Deerfield Insurance Company Evanston Insurance Company Essex Insurance Company Markel American Insurance Company Markel Insurance Company Associated International Insurance Company DataBreach SM APPLICATION

More information

CYBER LIABILITY INSURANCE: CLAIMS ISSUES AND TRENDS THAT AUDITORS NEED TO KNOW

CYBER LIABILITY INSURANCE: CLAIMS ISSUES AND TRENDS THAT AUDITORS NEED TO KNOW CYBER LIABILITY INSURANCE: CLAIMS ISSUES AND TRENDS THAT AUDITORS NEED TO KNOW INSURANCE RISK MANAGEMENT EMPLOYEE BENEFITS Presented by: Douglas R. Jones, CPCU, ARM, Senior Vice President, Principal www.rhsb.com

More information

BUSINESS-DRIVEN S E C U R I T Y

BUSINESS-DRIVEN S E C U R I T Y BUSINESS-DRIVEN SECURITY MARKET DISRUPTORS Mobile Cloud Big Data Extended Workforce Networked Value Chains APTs Sophisticated Fraud Infrastructure Transformation Less control over access device and back-end

More information

CHECK POINT SOFTWARE TECHNOLOGIES REPORTS 2018 FIRST QUARTER FINANCIAL RESULTS

CHECK POINT SOFTWARE TECHNOLOGIES REPORTS 2018 FIRST QUARTER FINANCIAL RESULTS INVESTOR CONTACT: MEDIA CONTACT: Kip E. Meintzer Adolph Hunter Check Point Software Technologies Check Point Software Technologies +1.650.628.2040 +1.650.628.2260 ir@checkpoint.com press@checkpoint.com

More information

Logicalis Global CIO Survey

Logicalis Global CIO Survey Logicalis Global CIO Survey Digital enablers: the challenges facing CIOs in an age of digital transformation A research paper from Logicalis based on a global study of CIO pressures and priorities In summary

More information

Electronic Commerce and Cyber Risk

Electronic Commerce and Cyber Risk Electronic Commerce and Cyber Risk Fifth Third Bank All Rights Reserved Reality and Solutions Objectives for Today What I will cover How banks are changing How the public is changing How the laws are changing

More information

Cyber insurance, security and data integrity insights

Cyber insurance, security and data integrity insights Cyber insurance, security and data integrity insights 1 Executive summary: insights into cybersecurity and risk As cyber threats have become more pervasive, persistent and sophisticated, information security

More information

EHR Contracting and Data Security

EHR Contracting and Data Security EHR Contracting and Data Security Briar Andresen Steven Helland January 10, 2018 Overview What is required HIPAA-related issues Selecting a vendor Key provisions Main EHR vendor EHR adjacent Data security

More information

Electronic Banking Service Agreement and Disclosure

Electronic Banking Service Agreement and Disclosure Electronic Banking Service Agreement and Disclosure What is Covered by this Agreement This Agreement between you and First Priority Bank governs the use of our Electronic and Internet Banking and Bill

More information

PAI Secure Program Guide

PAI Secure Program Guide PAI Secure Program Guide A complete guide to understanding the Payment Card Industry Data Security Requirements (PCI DSS) and utilizing the PAI Secure Program Welcome to PAI Secure, a unique 4-step PCI-DSS

More information

Enhanced Cyber Risk Management Standards. Advance Notice of Proposed Rulemaking

Enhanced Cyber Risk Management Standards. Advance Notice of Proposed Rulemaking Draft 11/29/16 Enhanced Cyber Risk Management Standards Advance Notice of Proposed Rulemaking The left column in the table below sets forth the general concepts that the federal banking agencies are considering

More information