JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group
|
|
- Curtis Wilkins
- 5 years ago
- Views:
Transcription
1 SPECIAL GUEST JAMES GRAY Underwriter, London UK Specialty Treaty Beazley Group All 6 Beazley Lloyd's Syndicates are rated A (Excellent) by A.M. Best Admitted Carrier in the US Beazley Ins Co rated A (Excellent) A.M. Best Specialist insurer began in 1986 and has grown to over $2.1bn in gross written premium in
2 AGENDA Why cyber and data threat protection Padlock Q & A WHY CYBER AND DATA THREAT PROTECTION. 2
3 I GLOBAL CYBER EXPOSURES The cyber risk to business is growing in frequency and financial impact. The cost to the global economy of cybercrime has been estimated at $445 billion a year (WE 2017). This threat is varied and adaptable, easier to attack than defend. The rise of internet connected devices (IoT) gives attackers more opportunity. Not just about technology, human factor is significant. II THE CANADIAN PERSPECTIVE $7.2m Amount of money small and medium-sized businesses across Canada spent in 2016 to recover from data breaches +44% The increase in the average number of cyber attacks against small and medium-sized businesses in Canada since 2014 $278 The average cost per lost or stolen record in Canada #2 Canada s ranking in the list of the world s most affected regions for ransomware attacks Digital Privacy Act (DPA) will take effect later this year. This act mandates that all data breaches are reported. Organizations will have to notify users of any breach that that could pose a real risk or significant harm. 3
4 III WHAT ARE THE THREATS INSIDE THREATS Employee negligence Security failures Lost portable devices Unintended disclosures by , fax, phone or in person Failure to encrypt portable devices Employee ignorance Improper disposal of personal information (dumpsters) Lack of education and awareness Malicious and/or nosey employees OUTSIDE THREATS Hackers Malware Phishing and spear phishing Thieves Social engineering tools Stolen portable devices Vendors/Business Associates IV WHAT IS AT STAKE? Time - Time spent on incident response is time away from day-to-day operations Money - Responding to incidents can mean legal fees, forensic investigation costs, notification and call center costs, and paying for credit monitoring, Lawsuits, Regulatory investigation, fines, corrective action, and penalties Reputation Customers trust 4
5 Padlock Industry leading cyber and data threat PROTECTION Coverage Structure Discussion Breach and claim scenarios Eligibility criteria Special acceptances PADLOCK CYBER & DATA THREAT PROTECTION COVERAGE SUMMARY Third Party Protection Information Security and Privacy Liability Regulatory Defense and Penalties Website Media and Content Liability First Party Protection for your Business Customers Privacy Breach Response Services PCI Fines and Penalties Cyber Extortion First Party Data Protection First Party Network Business Interruption 5
6 PADLOCK CYBER & DATA THREAT PROTECTION COVERAGE THIRD PARTY PROTECTION Information Security and Privacy Liability Covers damages and expenses resulting from a violation of a privacy law for: theft, loss, or unauthorized disclosure of personally identifiable non-public information or third party corporate information acts or incidents that directly result from a failure of computer security to prevent a security breach failure to timely disclose an incident in violation of any breach notice law failure to comply with that part of a business privacy policy Regulatory Defense and Penalties Covers defense expenses and penalties resulting from a regulatory proceeding resulting from a violation of privacy law PADLOCK CYBER & DATA THREAT PROTECTION COVERAGE THIRD PARTY PROTECTION Website Media and Content Liability Covers damages and expenses for one or more of the following acts committed during the course of media activities: Defamation, libel or slander Violation of the rights of privacy of an individual Invasion or interference with an individual s right of publicity Plagiarism, piracy, misappropriation of ideas Infringement of copyright Infringement of domain name, trademark, trade name, logo etc Improper deep-linking or framing within electronic content 6
7 PADLOCK CYBER & DATA THREAT PROTECTION COVERAGE PRIVACY BREACH RESPONSE SERVICES Privacy Breach Response Services To provide breach services that include: forensic and legal assistance from a panel of experts to help determine the extent of the breach and the steps needed to comply with applicable laws notification to persons who must be notified under applicable law credit monitoring and fraud protection services to affected individuals. Alternatively, insureds may choose to offer their customers a data monitoring service public relations expenses & crisis management consultants PCI Fines and Penalties To indemnify the insured for PCI fines and expenses that they may incur following a breach PADLOCK CYBER & DATA THREAT PROTECTION COVERAGE FIRST PARTY PROTECTION FOR YOUR BUSINESS CUSTOMERS Cyber Extortion Coverage for payments made to prevent or stop a threat to breach computer security, destroy or corrupt data, or interrupt or computer systems. First Party Data Protection First party coverage for data restoration, data recreation and system restoration, a data protection loss as a direct result of alteration, corruption, destruction, deletion or damage to a data asset, or inability to access a data asset, that is directly caused by a failure of computer security to prevent a security breach. First Party Network Business Interruption Business interruption loss, lost income and extra expenses as a direct result of an actual and necessary interruption of computer systems caused directly by a failure of computer security to prevent a security breach. 7
8 Padlock - Cyber and Data Protection STRUCTURE PADLOCK CYBER & DATA PROTECTION STRUCTURE UNDERSTANDING THE POLICY... THREE TOWERS OF COVERAGE Separate towers means more cover for Padlock policyholders 8
9 PADLOCK CYBER & DATA PROTECTION STRUCTURE UNDERSTANDING THE POLICY... THREE TOWERS OF COVERAGE PADLOCK CYBER & DATA PROTECTION STRUCTURE UNDERSTANDING THE POLICY... THREE TOWERS OF COVERAGE 9
10 Padlock - Cyber and Data threat Protection DISCUSSION Key Messages Common Objections Discussion Questions KEY MESSAGES THE THREAT IS REAL It s no longer a matter of if, but when it is likely that businesses at some time will be affected by a breach event The law may impose obligations upon insureds are they in a position to understand and do they have the resources required to effectively respond Business may rely on outsourced providers, but if they are entrust them with their data the business may still ultimately remain legally liable if the data is misplaced Even the most sophisticated security systems can be impacted by human error or a rogue employee VALUABLE HELP AFTER AN INCIDENT Padlock gives insureds access to a breach response services team which has handled over 5,500 breaches globally since 2009 They have the capability and expertise to support a range of insureds from large multi-nationals to micro-business The team is available to consult with the insured and liaise with vendors from the approved panel that have the knowledge and capabilities to handle the response Access to the service team is included within the policy at no charge and does not erode the policy limits 10
11 KEY MESSAGES PADLOCK WAS DESIGNED SPECIFICALLY FOR SMALL BUSINESS Small businesses are generally less prepared for breach response before the event and have less resources to dedicate when it occurs Accessing this experience allows the small business to carry on business without having to divert as much time and energy to dealing with the problem Small business rely on trust of their employees and do not believe their employees would either cause a breach maliciously or innocently COMMON OBJECTIONS AREN T THE EXPOSURES ALREADY COVERED UNDER THE CGL? This product often fills a gap in coverage their other general commercial policies may have excluded or are beginning to exclude cyber from these policies The GL is unlikely to pick up the first party response costs nor is the form likely to be as robust Data is not often property under CGL IS THE AUTOMATIC LIMIT A LOW STARTING POINT? Highly affordable coverage at a structure that would be unobtainable from many insurers Low friction, no additional underwriting questions to at point of sale for automatic limit Padlock has robust coverages across 3 Towers of separate and distinct aggregates, most insurers will stack all coverages in one CAD aggregate, important when benchmarking If the insured wants to complete an application then they can be underwritten for larger limits, just ask your Gore contact 11
12 COMMON OBJECTIONS MY CLIENTS ARE TO SMALL TO BE ON THE RADAR OF HACKERS? Media only sensationalize mega breaches. Vast majority of breaches are small (< 100,000) and boring SMEs are often low hanging fruit due to lacks security Not all attacks are bespoke, the majority are broad and indiscriminate Not all breaches are electronic in nature. 18% are physical loss WILL THE BREACH RESPONSE SERVICES TEAM MAKE DECISIONS FOR THE CLIENT The experienced breach response services team assist the insured navigate breach They help by co-ordinating and analysing the situation through the lifecycle of the breach Decision on how to respond remains with the insured Transparency and choice of selection on select service providers DISCUSSION QUESTIONS HOW PREPARED IS YOUR CLIENT FOR THE AFFECTS OF A CYBER INCIDENT? Even tight security systems can be fallible Insurance purchase should be part of their preparation WHAT ASSISTANCE DOES YOUR CLIENT NEED IN THE EVENT OF A DATA BREACH INCIDENT AND HOW DOES THAT MATCH WITH THE INSURER S OFFERING? Not all offerings are the same Broadly speaking forms range from solely reimbursement to full response service offering Padlock puts response first with a breach response services team and utilising a panel of service providers offering; Capability & Competency Capacity (outside of Conflict)Cost (preferred rates means more bang for your buck ) 12
13 DISCUSSION QUESTIONS WHAT IS THE TRIGGER TO DATA BREACH COVERAGE? Padlock goes beyond just providing cover for an incident to include coverage for a reasonably suspected incident DOES THE INSURER IMPOSE ANY MINIMUM SECURITY LEVEL OR PATCH REQUIREMENT WARRANTIES? Some insurers require robust and strict security controls Padlock does not impose such restrictions WHAT INFORMATION DO THEY REQUIRE IN THE UNDERWRITING PROCESS? Some insurers will need long and complicated applications We already have the information we need to provide Padlock at automatic limits Padlock - Cyber and Data threat Protection BREACH & CLAIM SCENARIOS 13
14 BREACH AND CLAIMS SCENARIOS #1 WANNACRY RANSOMWARE INFECTION HITS MULTIPLE INSURING AGREEMENTS The insured reported that one of its computers was infected with the WannaCry malware. The malware encrypted large chunks of data. The hackers demanded ransom payment to unencrypt. Privacy Breach Response Services To assist the insured and determine the best course of action throughout the whole response Cyber Extortion To cover ransom payments following an Extortion Threat if the insured decides to pay and that is pre-agreed by Gore First Party Data Protection To cover data restoration, data recreation and system restoration following damage to a data asset as a result of the event First Party Business Interruption To cover income loss and extra expense for the insured in their downtime following an event Information Security & Privacy If the event caused a disclosure of personally identifiable non-public information which violated Privacy Law the policy would cover damages and claim expenses for the insured BREACH AND CLAIMS SCENARIOS #2 BURGLARY PHYSICAL LOSS OF PAPER RECORDS A franchise notified their Insurer that one of its stores was broken into and a lockbox containing employee and direct deposit information was stolen. The Breach Response Service team connected the insured to privacy counsel who advised the insured that a breach of paper records containing employee personally identifiable information including social security numbers required notification under relevant provincial law. Privacy counsel drafted the legally required notifications and the Breach Response Service team arranged for credit monitoring to be offered to the affected employees and former employees. 14
15 BREACH AND CLAIMS SCENARIOS #3 HOTEL BREACH UNINTENDED DISCLOSURE Franchisee of hotel chain had a computer error where guests' credit card numbers, passport numbers, or driver's license numbers were entered into a field intended to house residential address information, which was then shared with marketing partners and/or used for a mailing. The Breach Response Service team connected the hotel with a law firm as well as a forensic firm, who together determined that approximately 30,000 individuals needed to be notified. The Breach Response Service team also lined up a notification and call center services vendor. One regulator opened a regulatory investigation. BREACH AND CLAIMS SCENARIOS #4 RETAIL POS BREACH EXAMPLE A small fast-food chain received a Common Point of Purchase (CPP) notice from VISA, MasterCard and Discover which indicated credit card vulnerabilities potentially related to one of the insured s restaurant locations. Breach Response Service Team recommended and connected insured with panel privacy counsel and forensics. The forensics assessment determined that approximately 6,000 cards were affected. Due to the fact that the insured did not retain customer names or addresses associated with the credit card numbers, and in order to satisfy the regulator substitute notice requirements, the insured posted notification on its website and in printed media. Costs exceeded $30,000 for legal, forensics and call center services; all services were facilitated by the Breach Response Services Team. 15
16 BREACH AND CLAIMS SCENARIOS #5 POTENTIAL DATA BREACH AT HOA The officer of an insured homeowners association discovered an unrecognized connection to his Dropbox account, on which homeowners association documents were stored for backup purposes. The officer and his wife were recently the victims of identity theft and were concerned that the unauthorized connection to Dropbox was how their identities were stolen. The Dropbox account contained the PII of members of the homeowners association as well as some contractors. The insured hired privacy counsel from the Breach Response Service panel, notified the affected individuals, and provided credit monitoring in connection with the notifications. Padlock - Cyber and Data threat Protection ELIGIBILITY CRITERIA 16
17 ELIGIBILITY CRITERIA We have a broad appetite for industry classes covering the vast majority of our policyholders. Policyholders are allocated a risk grading based on IAO code. Risk grading determines pricing structure. Padlock - Cyber and Data threat Protection HIGHER LIMITS 17
18 HIGHER LIMITS IF YOUR SMALL BUSINESS CUSTOMER WOULD LIKE HIGHER LIMITS OR IF THEY RE INELIGIBLE FOR THE AUTOMATIC PRODUCT: Contact your underwriter There is a short form application Additional premium would be required 18
PRIVACY AND CYBER SECURITY
PRIVACY AND CYBER SECURITY Presented by: Joe Marra, Senior Account Executive/Producer Stoya Corcoran, Assistant Vice President Presented to: CIFFA Members September 20, 2017 1 Disclaimer The information
More informationCyber-Insurance: Fraud, Waste or Abuse?
SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major
More informationCYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP
CYBER LIABILITY INSURANCE OVERVIEW FOR Prepared by: Evan Taylor NFP Targeted Industries Business Sector Financial Services 10% Non-Profit 11% Retail 10% Other 37% Other 18% Type of Data PII 40% Professional
More informationYour defence toolkit. How to combat the cyber threat
Your defence toolkit How to combat the cyber threat Contents The threat of cyber crime 4 How UK businesses are targeted 6 Case studies 8 Why cyber security is so important to manufacturers now 10 The
More informationCyber Risk Management
Cyber Risk Management Privacy & Data Protection Agenda 2 Introductions Risk Management 101 Defining & Quantifying a Breach Prevention, Mitigation & Transfer Strategies Finance Strategy- Cyber Insurance
More informationSTEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH
STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and data risks to your business,
More informationLIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE
I N S U R A N C E a g a i n s t c y b e r r i s k s After "prevention", risk covering is always the next step. Good insurance policies have the substantial merit allowing people to progress, even choosing
More informationCYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY
CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY Agenda Threat Landscape and Trends Breach Response Process Pitfalls and Critical Points BBR Services Breach Prevention
More informationA GUIDE TO CYBER RISKS COVER
A GUIDE TO CYBER RISKS COVER Cyber risk the daily business threat to SMEs Cyber risks and data security breaches are a daily threat to everyday business. Less than 10% of UK companies have cyber insurance
More informationCyber Liability Insurance for Sports Organizations
Cyber Liability Insurance for Sports Organizations The biggest threat to your organization or club isn t a loss of funds. It s a loss of data. From online sign-ups and payment systems to social media
More informationCyber Risks & Insurance
Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of
More informationCyber Risk Insurance. Frequently Asked Questions
Cyber Risk Insurance Frequently Asked Questions Frequently Asked Questions What is Cyber Risk? Why should I buy Cyber Risk Insurance? What is the cost? Who is Great American Insurance? Why should I buy
More informationNZI LIABILITY CYBER. Are you protected?
NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is
More informationCyber Security Liability:
www.mcgrathinsurance.com Cyber Security Liability: How to protect your business from a cyber security threat or breach. 01001101011000110100011101110010011000010111010001101000001000000100100101101110011100110111
More informationCyber Enhancement Endorsement
Cyber Enhancement Endorsement What is Cyber Risk? Why should I buy Cyber Risk insurance? What is the cost? Why should I buy Great American s product? Who do I contact to learn more about Cyber Risk Insurance?
More informationCyber Liability: New Exposures
Cyber Liability: New Exposures Presented by: CONRAD INSURANCE 2007, 2010-2011, 2013-2014 Zywave Inc. All rights reserved. New Economy, New Exposures Business shift: Bricks and Mortar to Clicks and Orders
More informationCyber Liability A New Must Have Coverage for Your Soccer Organization
Cyber Liability A New Must Have Coverage for Your Soccer Organization Presented By: Pat Pullen Jeanne Zabuska President Underwriting Manager February 17, 2012 Why do you need Cyber Liability? Have a web
More informationChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them
ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them PROVIDED BY HUB INTERNATIONAL October 25th, 2016 W W W. C H I C A G O L A N D R I S K F O R U M. O R G AGENDA 1. The evolution of
More informationInsuring your online world, even when you re offline. Masterpiece Cyber Protection
Insuring your online world, even when you re offline Masterpiece Cyber Protection Protect your online information from being an open network 97% of Chubb clients who had a claim paid were highly satisfied
More informationProtecting Against the High Cost of Cyberfraud
Protecting Against the High Cost of Cyberfraud THE ROLE OF CYBER LIABILITY INSURANCE IN YOUR RISK MANAGEMENT STRATEGY Paying the Price...2 The Ransomware Scourge...3 Policy Provisions...3 Management Liability...4
More informationAt the Heart of Cyber Risk Mitigation
At the Heart of Cyber Risk Mitigation De-risking Cyber Threats with Insurance Vikram Singh Abstract Management of risks is an integral part of the insurance industry. Companies have succeeded in identifying
More informationYou ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017
You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business
More informationCyber Risk Mitigation
Cyber Risk Mitigation Eide Bailly Howalt + McDowell Insurance Introduction Meet your presenters Eric Pulse Risk Advisory Director 20 years in the public accounting and consulting industry providing information
More informationCyber & Privacy Liability and Technology E&0
Cyber & Privacy Liability and Technology E&0 Risks and Coverage Geoff Kinsella Partner http://map.norsecorp.com http://www.youtube.com/watch?v=f7pyhn9ic9i Presentation Overview 1. The Cyber Evolution 2.
More informationEvaluating Your Company s Data Protection & Recovery Plan
Evaluating Your Company s Data Protection & Recovery Plan CBIA Cybersecurity Webinar Series 11AM 12PM Part V. Presented by: Stewart Tosh Charles Bellingrath Date: December 7, 2017 Today s presenters Stewart
More informationLargest Risk for Public Pension Plans (Other Than Funding) Cybersecurity
Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity 2017 Public Safety Employees Pension & Benefits Conference Ronald A. King (517) 318-3015 rking@ I am convinced that there are only
More informationCyber Insurance for Lawyers
Cyber Insurance for Lawyers Learn What Most People Don t Know About a Cyber Insurance Policy Cyber Crime Trends NAS Cybercrime 2017 Claims Analysis Report 1 in 4 Claims Exceeding $200,000 Average Cybercrime
More informationCYBER LIABILITY REINSURANCE SOLUTIONS
CYBER LIABILITY REINSURANCE SOLUTIONS CYBER STRONG. CYBER STRONG. State-of-the-Art Protection for Growing Cyber Risks Businesses of all sizes and in every industry are experiencing an increase in cyber
More informationCyber Risks & Cyber Insurance
Cyber Risks & Cyber Insurance Terry Quested Executive Director Associated Risk Managers of Ohio Darren Faye Vice President Leonard Insurance / Assured Partners Legal Disclaimer The views, information and
More informationCyber Liability Insurance. Data Security, Privacy and Multimedia Protection
Cyber Liability Insurance Data Security, Privacy and Multimedia Protection Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such
More informationBeazley Financial Institutions
Market leading protection tailored for financial institutions, providing seamless cover from crime and professional indemnity to directors & officers and data breach. 0 1 0 0 1 1 0 0 0 1 1 0 Beazley Financial
More informationData Breach Program Pricing Companies with revenues less than $1,000,000
Data Breach Program Pricing Companies with revenues less than Limit of Liability Aggregate $250,000 $500,000 $2,000,000 Retention $1,000 $1,000 $1,000 $1,000 25,000 records $250,000 $500,000 Security &
More informationCybersecurity Privacy and Network Security and Risk Mitigation
Ask the Experts at fi360 2016 Cybersecurity Privacy and Network Security and Risk Mitigation Gary Sutherland, NAPLIA CEO Brian Edelman, Financial Computer Inc. CEO Paul Smith, AIF NAPLIA SVP SEC s 1st
More informationThe Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage
The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage James P. Bobotek james.bobotek@pillsburylaw.com (202) 663-8930 Pillsbury Winthrop Shaw Pittman LLP DOCUMENT
More informationHOW TO INSURE CYBER RISKS? Oulu Industry Summit
HOW TO INSURE CYBER RISKS? Oulu Industry Summit 2017 6.10.2017 Panu Peltomäki Liability and Financial Lines Practice Leader Marsh Oy Marsh A Leader in Quality, Scope, and Scale GLOBAL RISKS OF CONCERN
More informationWhen The Wind Blows: Renewable Energy Risk Management Strategies
When The Wind Blows: Renewable Energy Risk Management Strategies Small Wind Conference 2017 1 Overview About HUB Insurance Solutions General Coverage Overview Stakeholders Cyber Liability Engineers and
More informationChubb Cyber Enterprise Risk Management
Chubb Cyber Enterprise Risk Management Fact Sheet Financial Lines Chubb Cyber Enterprise Risk Management When it comes to a data security breach or privacy loss, it isn t a matter of if it will happen
More informationDATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY
THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. DATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY Coverage under this endorsement is subject to the following: PART 1 RESPONSE
More informationMANAGING DATA BREACH
MANAGING DATA BREACH Beazley is a specialist insurer and leading provider of cyber insurance. Michael Phillips is a Claims Manager in the Technology, Media, and Business division of Beazley, and focuses
More informationCyber breaches: are you prepared?
Cyber breaches: are you prepared? Presented by Michael Gapes, Partner Overview What is cyber crime? What are the risks and impacts to your business if you are a target? What are your responsibilities do
More informationAdd our expertise to yours Protection from the consequences of cyber risks
CyberEdge THIS INFORMATION IS INTENDED FOR INSURANCE BROKERS AND OTHER INSURANCE PROFESSIONALS ONLY Add our expertise to yours Protection from the consequences of cyber risks What is CyberEdge? 2 CyberEdge
More informationHealthcare Data Breaches: Handle with Care.
Healthcare Data Breaches: Handle with Care November 13, 2012 ID Experts Webinar www.idexpertscorp.com The material presented in this presentation is not intended to provide legal or other expert advice
More informationPAI Secure Program Guide
PAI Secure Program Guide A complete guide to understanding the Payment Card Industry Data Security Requirements (PCI DSS) and utilizing the PAI Secure Program Welcome to PAI Secure, a unique 4-step PCI-DSS
More informationCyber Security & Insurance Solution Karachi, Pakistan
March 2017 Cyber Security & Insurance Solution Karachi, Pakistan Ram Garg CFA, MBA Financial & Casualty Line J B Boda & Co (Singapore) Pte Ltd Karachi Insurance Institute Agenda Cyber Risk - Background
More informationElectronic Commerce and Cyber Risk
Electronic Commerce and Cyber Risk Fifth Third Bank All Rights Reserved Reality and Solutions Objectives for Today What I will cover How banks are changing How the public is changing How the laws are changing
More informationDATA COMPROMISE COVERAGE FORM
DATA COMPROMISE DATA COMPROMISE COVERAGE FORM Various provisions in this policy restrict coverage. Read the entire policy carefully to determine rights, duties and what is and is not covered. Throughout
More informationCyber Risk & Insurance
Cyber Risk & Insurance Digitalization in Insurance a Threat or an Opportunity Beirut, 3 & 4 May 2017 Alexander Blom - AIG 1 Today s Cyber Presentation Cyber risks insights from an insurance perspective
More informationPersonal Information Protection Act Breach Reporting Guide
Personal Information Protection Act Breach Reporting Guide If an organization determines that a real risk of significant harm exists to an individual as a result of a breach of personal information, section
More informationDEBUNKING MYTHS FOR CYBER INSURANCE
SESSION ID: GRC-F02 DEBUNKING MYTHS FOR CYBER INSURANCE Robert Jones Global Head of Financial Lines Specialty Claims AIG Garin Pace Cyber Product Leader AIG @Garin_Pace Introduction What Is Cyber Insurance?
More informationErrors and Omissions, Media and Privacy (EMP) Claims Examples
Errors and Omissions, Media and Privacy (EMP) Claims Examples Errors and Omissions A management consulting firm specializing in efficiency consulting was hired to reduce the cost of distribution for a
More informationSixth Annual Benchmark Study on Privacy & Security of Healthcare Data
Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report
More informationWe re Under Cyberattack Now What?! John Mullen, Partner/Co-founder, Mullen Coughlin Jason Bucher, Senior Underwriting Manager, Schinnerer Cyber
We re Under Cyberattack Now What?! John Mullen, Partner/Co-founder, Mullen Coughlin Jason Bucher, Senior Underwriting Manager, Schinnerer Cyber Protection Data Creates Duties What data do you access, and
More informationProtoType 2.0 Manufacturing E&O with CyberInfusion
Table of Contents General Notice Pages 1-2 Third-Party Liability (claims made against you) Pages 3-10 First Party (your own losses) Pages 11-16 Business Interruption (your own losses) Pages 17-22 Common
More informationSurprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their
When It Comes to Data Breaches, Why Are Corporations Largely Uninsured? Under Attack and Unprepared: Argo Group Cyber Insurance Survey 2017 Surprisingly, only 40 percent of small and medium-sized enterprises
More informationCyber Liability Launch Event Moscow
Allianz Global Corporate & Specialty Cyber Liability Launch Event Moscow AGCS November 2016 Cyber Insurance market Stand Alone Business USA USA Started in the early to mid 1990 s 50 Started + carriers
More informationClaims Made Basis. Underwritten by Underwriters at Lloyd s, London
APPLICATION for: NetGuard Plus Claims Made Basis. Underwritten by Underwriters at Lloyd s, London tice: The Policy for which this Application is made applies only to Claims made against any of the Insureds
More informationVaco Cyber Security Panel
Vaco Cyber Security Panel ISACA Charlotte Chapter December 5 th, 2017 Vaco is an international talent solutions firm headquartered in Nashville, Tennessee, with more than 35 locations around the globe.
More informationTech and Cyber Claims Services
Tech and Cyber Claims Services Insurance Tech, Cyber Claims and our Breach Response Service The technology industry is a significant area of expertise for the Firm where we advise on contentious and non-contentious
More informationUntangling the Web of Cyber Risk: An Insurance Perspective
Untangling the Web of Cyber Risk: An Insurance Perspective BCAW: May 16 th, 2017 Gregory Eskins National Cyber Practice Leader gregory.eskins@marsh.com http://funpicc.blogspot.ca/2011/04/your-password-is-incorrect-will-ferrell.html
More informationPrivacy and Data Breach Protection Modular application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
More informationaustralia Canada ireland israel united kingdom United states Rest of world cfcunderwriting.com
australia Canada ireland israel united kingdom United states Rest of world CYBER PRIVATE ENTERPRISE policy document cfcunderwriting.com 1 PREAMBLE This Policy is a contract of insurance between you and
More informationProviding greater coverage for the greater good.
AGENT MATERIAL Hanover Nonprofit Advantage Providing greater coverage for the greater good. HANOVER NONPROFIT ADVANTAGE Comprehensive Solutions for Nonprofits. As part of our ongoing effort to enhance
More informationCyber, Data Risk and Media Insurance Application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
More informationInsurance Buyers News
Insurance Buyers News Springfield PO Box 4207, Springfield, MO 65808 Phone: 800-422-5275 417-887-3550 Fax: 417-887-3252 Rolla PO Box 1258, Rolla, MO 65402-1258 Phone: 800-364-2212 573-364-8888 Fax: 573-341-2257
More informationTrends in Cyber-Insurance Coverage to Meet Insureds Needs
Trends in Cyber-Insurance Coverage to Meet Insureds Needs Linda Wendell Hsu Selman Breitman LLP 33 New Montgomery Street, Sixth Floor San Francisco, CA 94105 (415) 979-0400 lhsu@selmanlaw.com William A.
More informationAn Overview of Cyber Insurance at AIG
An Overview of Cyber Insurance at AIG Michael Lee, MBA Cyber Business Development Manager AIG 2018 Brittney Mishler, ARM Cyber Casualty Underwriting Specialist AIG Cyber Insurance It s a peril, not a product
More informationCyber a risk on the rise. Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist
Cyber a risk on the rise Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist Cyber data breaches reaching a new level 1 000 000 000 Source: http://money.cnn.com/2016/09/22/technology/yahoo-data-breach/
More informationSTEPPING INTO THE BREACH A GUIDE TO CYBER AND DATA INSURANCE
STEPPING INTO THE BREACH A GUIDE TO CYBER AND DATA INSURANCE 1 A GUIDE TO CYBER AND DATA INSURANCE Cyber and data insurance helps to support and protect your business in the event of an attack. This practical
More informationIS YOUR CYBER LIABILITY INSURANCE ANY GOOD? A GUIDE FOR BANKS TO EVALUATE THEIR CYBER LIABILITY INSURANCE COVERAGE
IS YOUR CYBER LIABILITY INSURANCE ANY GOOD? A GUIDE FOR BANKS TO EVALUATE THEIR CYBER LIABILITY INSURANCE COVERAGE THOMAS H. BENTZ, JR.* I. INTRODUCTION The last several years have taught many banks that
More informationCase study. Malware mayhem. A targeted ransomware attack on a technology provider opens up a can of worms
Case study Malware mayhem A targeted ransomware attack on a technology provider opens up a can of worms Ransomware is one of the fastest growing forms of cybercrime in the world. According to our own claims
More informationConSept: Policy Highlights: Other Coverage Features
An ever changing and increasingly regulated business environment presents a plethora of risks and threats for Companies, who face potential litigation, financial loss, discrimination claims or on-line
More informationA FRAMEWORK FOR MANAGING CYBER RISK APRIL 2015
APRIL 2015 CYBER RISK IS HERE TO STAY Even an unlimited budget for information security will not eliminate your cyber risk. Tom Reagan Marsh Cyber Practice Leader 2 SIMPLIFIED CYBER RISK MANAGEMENT FRAMEWORK
More informationWhat is a privacy breach / security breach?
What is a breach? What is a privacy breach / security breach? Privacy breach Computer security breach: The theft, loss or unauthorized disclosure of personally identifiable non-public information (PII)
More informationCYBER AND INFORMATION SECURITY COVERAGE APPLICATION
NOTICE: THIS APPLICATION IS FOR CLAIMS-MADE AND REPORTED COVERAGE, WHICH APPLIES ONLY TO CLAIMS FIRST MADE AND REPORTED IN WRITING DURING THE POLICY PERIOD, OR ANY EXTENDED REPORTING PERIOD. THE LIMIT
More informationTHE GENERAL DATA PROTECTION REGULATION
THE GENERAL DATA PROTECTION REGULATION IMPLICATIONS FOR ORGANISATIONS IN THE MIDDLE EAST The General Data Protection Regulation (GDPR) is a major revision to data protection laws in the EU and has potential
More informationACORD 834 (2014/12) - Cyber and Privacy Coverage Section
ACORD 834 (2014/12) - Cyber and Privacy Coverage Section ACORD 834, Cyber and Privacy Coverage Section, is used to apply for cyber and privacy coverage. The form was designed to be used in conjunction
More informationFIDUCIARY LIABILITY Risk review performed for: Date:
ForeFront Portfolio SM Risk Analyzer for Privately Held Companies FIDUCIARY LIABILITY Risk review performed for: Date: The Purpose of the Risk Analyzer When it comes to insuring your company, you can
More informationSara Robben, Statistical Advisor National Association of Insurance Commissioners
Moderated by Daniel Eliot, Director Small Business Programs National Cyber Security Alliance Sara Robben, Statistical Advisor National Association of Insurance Commissioners Angela Gleason, Senior Counsel
More informationCyber Risk Proposal Form
Cyber Risk Proposal Form Company or trading name Address Postcode Country Telephone Email Website Date business established Number of employees Do you have a Chief Privacy Officer (or Chief Information
More informationCyber Liability State of the Insurance Market & Risk Update Sept 8, ISACA North Texas
Cyber Liability State of the Insurance Market & Risk Update Sept 8, 2016 ISACA North Texas Agenda Introduction Cyber Liability Overview State of Insurance Regulatory Update Questions and Discussion 2 Speakers
More informationInsuring! Agreement Claim! Scenario Coverage! Response Network &! Information! Security Liability A hacker successfully obtains sensitive, personal information from the insured s computer system. As a
More informationMEDIATECH INSURANCE APPLICATION THIS APPLICATION IS FOR A CLAIMS MADE POLICY PLEASE INDICATE WHICH COVERAGES ARE REQUIRED Technology and Professional
THIS APPLICATION IS FOR A CLAIMS MADE POLICY PLEASE INDICATE WHICH COVERAGES ARE REQUIRED Technology and Professional Services: $100,000 $250,000 $500,000 $1,000,000 $2,000,000 Other:$ Technology Product
More informationCrawford Cyber Risk Services. A definitive solution for cyber-related events
Crawford Cyber Risk Services A definitive solution for cyber-related events CYBER-RELATED EVENTS An Increasing Threat Companies in all industries face an increasing threat of a cyber attack and cyber-related
More informationARE YOU HIP WITH HIPAA?
ARE YOU HIP WITH HIPAA? Scott C. Thompson 214.651.5075 scott.thompson@haynesboone.com February 11, 2016 HIPAA SECURITY WHY SHOULD I CARE? Health plan fined $1.2 million for HIPAA breach. Health plan fined
More informationProfessional Indemnity and Cyber Insurance for Technology Companies Summary of cover
Professional Indemnity and Cyber Insurance for Technology Companies Summary of cover Contents Introduction 2 Section 1: Professional Indemnity 2 Section 2: Cyber Insurance 2 Extensions that apply to your
More informationHEALTHCARE INDUSTRY SESSION CYBER IND 011
HEALTHCARE INDUSTRY SESSION CYBER IND 011 Speakers: Jody Westby, Chief Executive Officer, Global Cyber Risk René Siemens, Partner, Covington & Burling LLP Brent Rieth, Senior Vice President and Team Leader,
More informationInsurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage
Presenting a live 90-minute webinar with interactive Q&A Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage THURSDAY, OCTOBER 5, 2017 1pm Eastern 12pm Central
More informationCyber Liability & Data Breach Insurance Nikos Georgopoulos Oracle Security Executives Breakfast 23 April Cyber Risks Advisor
Cyber Liability & Data Breach Insurance Nikos Georgopoulos Oracle Security Executives Breakfast 23 April 2013 Cyber Risks Advisor 1 Contents Information Age Directive On Network and Information Security
More informationCYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner
CYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner CYBER EXPOSURE IN IF TOPICS Brief overview of If s Liability portfolio Cyber today s definition Cyber coverages
More informationAPPLICATION FOR DATA BREACH AND PRIVACY LIABILITY, DATA BREACH LOSS TO INSURED AND ELECTRONIC MEDIA LIABILITY INSURANCE
Deerfield Insurance Company Evanston Insurance Company Essex Insurance Company Markel American Insurance Company Markel Insurance Company Associated International Insurance Company DataBreach SM APPLICATION
More informationMedia Liability Risks for Financial Advisors
Aon Risk Solutions Media Liability Risks for Financial Advisors January 2015 Risk. Reinsurance. Human Resources. Introduction In an effort to keep up in the age of Facebook and Twitter, an increasing number
More informationCyberSelect. Policy Wording. Issued by Agile Underwriting Services Pty Ltd ABN AFSL CyberSelect v.1.9
CyberSelect Policy Wording Issued by Agile Underwriting Services Pty Ltd ABN 48 607 908 243 AFSL 483374 Policy Schedule 1. Policy Number: 2. Policy Period: From: To: 3. Named Insured: 4. Address: 5. Proposal
More informationCYBER INSURANCE GUIDE
CYBER INSURANCE GUIDE cfcunderwriting.com OW EXP As we become increasingly reliant on technology, the potential impact of cyber-related incidents continues to grow. Yet the cyber insurance market is relatively
More informationWhitepaper: Cyber Liability Insurance Overview
Whitepaper: Cyber Liability Insurance Overview Sponsored by the State, Local, Tribal, and Territorial Government Coordinating Council (SLTTGCC) June 2016 Contents Contents... 2 1. Introduction... 3 2.
More informationCYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING
CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING 2015 Verizon Data Breach Report 79,790 security incidents 2,122 confirmed data breaches Top industries affected: Public, Information,
More informationCredit Card Data Breaches: Protecting Your Company from the Hidden Surprises
Credit Card Data Breaches: Protecting Your Company from the Hidden Surprises By David Zetoony Partner, Bryan Cave LLP Courtney Stout Counsel, Davis Wright Tremaine LLP With Contributions By Suzanne Gladle,
More informationCybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do
ARTICLE Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do By Gene Griggs and Saad Gul This article analyzes cybersecurity issues for retirement plans. Introduction
More informationFraud and Cyber Insurance Discussion. Will Carlin Ashley Bauer
Fraud and Cyber Insurance Discussion Will Carlin Ashley Bauer Why is it Important to Remain Vigilant? Fraud does not discriminate it occurs everywhere, and no organization is immune The changing business
More informationOLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE
OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE August 2017 WHO NEEDS PCI TRAINING? THE FOLLOWING TRAINING MODULE SHOULD BE COMPLETED BY ALL UNIVERSITY STAFF THAT: - PROCESS PAYMENTS
More informationSPRINT CLOUDCOMPUTE INFRASTRUCTURE SERVICES PRODUCT ANNEX
SPRINT CLOUDCOMPUTE INFRASTRUCTURE SERVICES PRODUCT ANNEX The following terms and conditions, together with the Sprint Standard Terms and Conditions for Communication Services ( Standard Terms and Conditions
More information