Cyber Risk. October 2017
|
|
- Eustace Elliott
- 6 years ago
- Views:
Transcription
1 Cyber Risk October 2017
2 The Cyber Landscape
3 Dimensions to cyber risk Who is likely to target your clients Which jurisdictions do they operate in? Threat Types What is their line of business? Geography How good are they in preventing and detecting an attack? Sector Security 3
4 Threat Types Organised crime Global, difficult to trace and prosecute Motivation: Financial advantage Impact to business: Financial loss Competitors Competition or rivalry Motivation: Gain business edge Impact to business: IP theft, reputation damage Who would target you, your clients and why? The insider Intentional or unintentional Motivation: Grudge, financial gain Impact to business: Distribution or destruction, theft of information, reputation loss Hacktivism Hacking inspired by ideology Motivation: Shifting allegiances dynamic, unpredictable Impact to business:public distribution, reputation loss State-sponsored Espionage and sabotage Motivation: Political advantage, economic advantage, military advantage Impact to business:disruption or destruction, theft of information, reputational loss 4
5 CYBER UNDERWORLD 2017 KPMG Management & Risk Consulting Sdn. Bhd., a company incorporated under Malaysian law and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ( KPMG 2016 International ), KPMG LLP, a Swiss a UK entity. limited All rights liability reserved. partnership Printed in Malaysia. and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative 5
6 Ransomware Major growth in range of groups and tools since Oct 2015 Particular threat to hospitals 44% of business hit in last 24 months Most pay up Small ransoms often only 1 bitcoin Large scale extortion attacks 6
7 CYBER UNDERWORLD 2017 KPMG Management & Risk Consulting Sdn. Bhd., a company incorporated under Malaysian law and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ( KPMG 2016 International ), KPMG LLP, a Swiss a UK entity. limited All rights liability reserved. partnership Printed in Malaysia. and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative 7
8 CEO Frauds Criminals now looking beyond financial sector CEO and business compromise fraud now rampant Sophisticated social engineering Networks of call centres FBI warn received fraud reports totalling $3.1 Billion Recent example of $44 million fraud Attacks now tailored to firms, their business and their employees 8
9 CYBER UNDERWORLD 2017 KPMG Management & Risk Consulting Sdn. Bhd., a company incorporated under Malaysian law and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ( KPMG 2016 International ), KPMG LLP, a Swiss a UK entity. limited All rights liability reserved. partnership Printed in Malaysia. and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative 9
10 Persistent and targeted attacks SWIFT attacks followed Attempted $951M fraud at Bank of Bangladesh Speculation over criminal and State links and flow down of techniques $81M successfully transferred to Philippine casinos Other SWIFT attacks followed Weak links? Carbanak signalled a new type of attack Persistent and stealthy 10
11 Geographic Distribution >30% 25-30% 20-25% 15-20% 10-15% 5-10% Microsoft Security Intelligence Report 20 Malw are encounter rates Q
12 The Underwriting Landscape
13 The Underwriting Landscape The current coverage landscape may be split into the following areas with coverages across 1 st Party and 3 rd Party. SME Non-SME US Non US 1 st Party 1 st Party 3 rd Party 1 st Party 1 st Party covers: - Ransomware - Cyber extortion - Network breakdown - Costs of reconstituting data - Remediation costs 3 rd Party covers: - Network liability - Data breach - Multimedia - Breach of privacy 13
14 New opportunities are emerging in insurance Development of cyber insurance may follow several waves, gradually expanding from core propositions focusing on digital assets to new products covering other types of assets and evensome non-cyber perils Other intangible assets Wave 1 enhancing core propositions with strong crisis management serv ices. Product development Privacy breach Cyber crime & fraud Physical BI with cyber peril Extortion Cyber BI Data & software loss Cyber physical damage Network Security liability IP theft Rep harm Wave 1 Wave 2 Wave 3 Wave 4 Wave 2 improv ing risk modelling and cov erage. Wave 3 expanding to other assets with cy ber triggers. Wave 4 - innov ating to dev elop products to address market gaps. Wave 5 considering to expand scope to cov er other intangible assets with non-cy ber perils. Time horizon 14
15 Insurance Company Organisational Design Today s Insurance company Property Casualty Financial lines Speciality Crisis Management Others Cyber Cyber Cyber Cyber Tomorrow s Insurance Company Personal lines products Cyber Centre of Excellence Commercial lines products 15
16 Underwriting and Claims Considerations Initial Risk Assessment Process needs to be quick and not intrusive Difference between SME vs Large SME risks can be managed via a finite number of questions in most cases. Large risks require a larger set of questions. Questionnaires/Interviews On-line assessments External penetration assessments (using 3rd party vendors) Full reviews Underwriting Judgement Challenges of Initial Risk Assessment Reliance of 3rd party data Data only provides a snapshot Insufficient data Previous step does not absolve responsibility of underwriter Underwriter s judgement and skill Assess data Map exposures to coverage offered by policy Large vs SME View on accumulation Claims What does the customer need? SME Dedicated hotline Incident response/crisis Management, NOT indemnity Large Corporates In house teams to deal with initial response Need expert support Some indemnity element Data is available Able to create a view on a client s capabilities: Documentation and process reviews Training Incident response procedures Systems But limitations could exist (e.g. outside-in view only) Pricing Process Limited data on new coverages Issues with historical data 16
17 Bringing it all together Cyber modelling should be based on a detailed assessment of the threats, activations and motivations underpinning potential attacks; and builds up elements of risk based on detailed intelligence from our cyber experts. Threats Assets Actors Counters Cyber Insights by Sector Identif y the most common threats to organisations, depending on their sector. Lev erage threat intelligence and historical data to identif y credible threats. Valued assets v ary f rom organisation to organisation, howev er, there tend to be similarities within each sector. Use industry experience to map the ty pical v alued assets f or a sector. This can then be conf irmed with each indiv idual prospectiv e policy holder. Organisations can be more susceptible to hacktivists, criminals or state sponsored attacks, to name a f ew, depending on the sector they operate. Use threat data and past incidents to identif y the potential actors behind cy ber attacks. Understand the maturity of dif f erent sectors. Determine credible scenarios of cy ber ev ents f or each sector. Scenarios Construct f orward looking scenarios based on 2 approaches:. Use an existing cy ber ev ent and associated losses and extrapolate to f orm an extreme event which has not been observ ed y et. Use an existing large ev ent as the starting point and then consider if a cy ber attack could be the root cause of a future event of a similar nature. If the answer is y es, then use the ev ent loss prof ile to inf orm the scenario. Modelling Combine cy ber insights and knowledge of the industry, such as: companies in the industry, sy stems or third party v endors employ ed, security v ulnerabilities in the sector, known attacks and measures the companies are taking to def end (or not). Try to assign f requency and sev erity assumptions to the chosen scenario based on detailed analy sis and expert judgement. ( KPMG International ), a Swiss entity. All rights reserved. 17
18 Frequency Severity Approach Frequency Define the Risk Segment Determine relevant threats for each Risk Segment Annual probability of successful attack from available data/insights - A% DDoS - B% Malware - C% Extortion Adjust for: Forward looking view of risk (Threat Intelligence Reports) Judgement Scoring Selected Parameters (annual probability of successful attack) X% DDoS Y% Malware Z% Extortion Selected Variability +-% +-% +-% Individual Risk Pricing Validation of reserving Sector Country Company profile Counters DDoS Ransomware Extortion Terrorism Severity SIMULATIONS IELR testing Capital Modelling Look at what the immediate effect is on the company Collect information that is a proxy for this effect Create model points from each of the relevant threats to estimate costs split by heads of damage: Breach costs Fines Liability Selected Parameters DDoS $ $ $ Malware $ $ Extortion $ $ $ Selected Variability +-% +-% +-% 18
19 kpmg.com/uk The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavour to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation KPMG LLP, a UK limited liability partnership and a member firm of the KPMG network of independent member firms affiliatedwith KPMG International Cooperative The KPMG name and logo are registered trademarks or trademarks of KPMG International. Create KGS: CRT067112D
Cyber Risk & Insurance
Cyber Risk & Insurance Digitalization in Insurance a Threat or an Opportunity Beirut, 3 & 4 May 2017 Alexander Blom - AIG 1 Today s Cyber Presentation Cyber risks insights from an insurance perspective
More informationCyber-Insurance: Fraud, Waste or Abuse?
SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major
More informationChubb Cyber Enterprise Risk Management
Chubb Cyber Enterprise Risk Management Fact Sheet Financial Lines Chubb Cyber Enterprise Risk Management When it comes to a data security breach or privacy loss, it isn t a matter of if it will happen
More informationHEALTHCARE INDUSTRY SESSION CYBER IND 011
HEALTHCARE INDUSTRY SESSION CYBER IND 011 Speakers: Jody Westby, Chief Executive Officer, Global Cyber Risk René Siemens, Partner, Covington & Burling LLP Brent Rieth, Senior Vice President and Team Leader,
More informationYou ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017
You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business
More informationYour defence toolkit. How to combat the cyber threat
Your defence toolkit How to combat the cyber threat Contents The threat of cyber crime 4 How UK businesses are targeted 6 Case studies 8 Why cyber security is so important to manufacturers now 10 The
More informationAt the Heart of Cyber Risk Mitigation
At the Heart of Cyber Risk Mitigation De-risking Cyber Threats with Insurance Vikram Singh Abstract Management of risks is an integral part of the insurance industry. Companies have succeeded in identifying
More informationCyber Security & Insurance Solution Karachi, Pakistan
March 2017 Cyber Security & Insurance Solution Karachi, Pakistan Ram Garg CFA, MBA Financial & Casualty Line J B Boda & Co (Singapore) Pte Ltd Karachi Insurance Institute Agenda Cyber Risk - Background
More informationCyber a risk on the rise. Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist
Cyber a risk on the rise Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist Cyber data breaches reaching a new level 1 000 000 000 Source: http://money.cnn.com/2016/09/22/technology/yahoo-data-breach/
More informationA GUIDE TO CYBER RISKS COVER
A GUIDE TO CYBER RISKS COVER Cyber risk the daily business threat to SMEs Cyber risks and data security breaches are a daily threat to everyday business. Less than 10% of UK companies have cyber insurance
More informationBeazley Financial Institutions
Market leading protection tailored for financial institutions, providing seamless cover from crime and professional indemnity to directors & officers and data breach. 0 1 0 0 1 1 0 0 0 1 1 0 Beazley Financial
More informationSeizing the cyber insurance opportunity
Seizing the cyber insurance opportunity Rethinking insurers strategies and structures in the digital age Thriving on disruption series As our world becomes increasingly digital, insurers have an opportunity
More informationChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them
ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them PROVIDED BY HUB INTERNATIONAL October 25th, 2016 W W W. C H I C A G O L A N D R I S K F O R U M. O R G AGENDA 1. The evolution of
More informationCybersecurity Insurance: The Catalyst We've Been Waiting For
SESSION ID: CRWD-W16 Cybersecurity Insurance: The Catalyst We've Been Waiting For Mark Weatherford Chief Cybersecurity Strategist varmour @marktw Agenda Insurance challenges in the market today 10 reasons
More informationCyber insurance: The next frontier. Cyber insurance the next frontier
Cyber insurance the next frontier 1 Table of contents Summary 3 The Market Need 3 Cyber Risk: A Growing Concern 4 Rising Cost of Cyber Crime 5 Impact by Industry 6 Cyber Risk and Insurance 7 Cyber Risk
More informationConSept: Policy Highlights: Other Coverage Features
An ever changing and increasingly regulated business environment presents a plethora of risks and threats for Companies, who face potential litigation, financial loss, discrimination claims or on-line
More informationCYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner
CYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner CYBER EXPOSURE IN IF TOPICS Brief overview of If s Liability portfolio Cyber today s definition Cyber coverages
More informationCYBER INSURANCE GUIDE
CYBER INSURANCE GUIDE cfcunderwriting.com OW EXP As we become increasingly reliant on technology, the potential impact of cyber-related incidents continues to grow. Yet the cyber insurance market is relatively
More informationCyber breaches: are you prepared?
Cyber breaches: are you prepared? Presented by Michael Gapes, Partner Overview What is cyber crime? What are the risks and impacts to your business if you are a target? What are your responsibilities do
More informationSECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD
SECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD The insured perils Criminal abduction, assault, bribery demand, competitor malfeasance, criminal facilitation, murder, product tampering, stalking,
More informationCyber Risks & Insurance
Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of
More informationCybersecurity Insurance: New Risks and New Challenges
SESSION ID: SDS1-F01 Cybersecurity Insurance: New Risks and New Challenges Mark Weatherford Chief Cybersecurity Strategist varmour @marktw The cybersecurity market in the Asia Pacific region contributes
More informationAdd our expertise to yours Protection from the consequences of cyber risks
CyberEdge THIS INFORMATION IS INTENDED FOR INSURANCE BROKERS AND OTHER INSURANCE PROFESSIONALS ONLY Add our expertise to yours Protection from the consequences of cyber risks What is CyberEdge? 2 CyberEdge
More informationClosing the Gap. Cyber Security and the insurance sector. July 2017 KPMG.AE KPMG.OM
Closing the Gap Cyber Security and the insurance sector July 2017 KPMG.AE KPMG.OM The changing threat As much as new technology has provided a platform for business innovation and growth, it has also brought
More informationHOW TO INSURE CYBER RISKS? Oulu Industry Summit
HOW TO INSURE CYBER RISKS? Oulu Industry Summit 2017 6.10.2017 Panu Peltomäki Liability and Financial Lines Practice Leader Marsh Oy Marsh A Leader in Quality, Scope, and Scale GLOBAL RISKS OF CONCERN
More informationCyber Risk Insurance. Frequently Asked Questions
Cyber Risk Insurance Frequently Asked Questions Frequently Asked Questions What is Cyber Risk? Why should I buy Cyber Risk Insurance? What is the cost? Who is Great American Insurance? Why should I buy
More information2017 Cyber Security and Data Privacy Study
RESEARCH REPORT DECEMBER 2017 2017 Cyber Security and Data Privacy Study How does your company compare? TABLE OF CONTENTS 05 How does your company compare? 06 Key findings 08 Cyber security and data privacy
More informationCyber Enhancement Endorsement
Cyber Enhancement Endorsement What is Cyber Risk? Why should I buy Cyber Risk insurance? What is the cost? Why should I buy Great American s product? Who do I contact to learn more about Cyber Risk Insurance?
More informationDEBUNKING MYTHS FOR CYBER INSURANCE
SESSION ID: GRC-F02 DEBUNKING MYTHS FOR CYBER INSURANCE Robert Jones Global Head of Financial Lines Specialty Claims AIG Garin Pace Cyber Product Leader AIG @Garin_Pace Introduction What Is Cyber Insurance?
More informationCybersecurity and the Law Seminar
Cybersecurity and the Law Seminar A practical walk-through of the legal landscape, enforcement, management liability and discussions on potential real-world situations Zurich 25 September 2018 What can
More informationTech and Cyber Claims Services
Tech and Cyber Claims Services Insurance Tech, Cyber Claims and our Breach Response Service The technology industry is a significant area of expertise for the Firm where we advise on contentious and non-contentious
More informationCyber-risk and cyber-controls:
Cyber-risk and cyber-controls: 1 Insurance alone is not enough Cyber-risk has become one of the most significant topics in boardrooms around the world. The threat is indeed, very real. Consequently, in
More informationSTEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH
STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and data risks to your business,
More informationNZI LIABILITY CYBER. Are you protected?
NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is
More informationLIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE
I N S U R A N C E a g a i n s t c y b e r r i s k s After "prevention", risk covering is always the next step. Good insurance policies have the substantial merit allowing people to progress, even choosing
More informationCyber & Privacy Liability and Technology E&0
Cyber & Privacy Liability and Technology E&0 Risks and Coverage Geoff Kinsella Partner http://map.norsecorp.com http://www.youtube.com/watch?v=f7pyhn9ic9i Presentation Overview 1. The Cyber Evolution 2.
More informationCyber Risks A Reinsurer s Perspective on Exposure & Claims. EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier
Cyber Risks A Reinsurer s Perspective on Exposure & Claims EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier Cyber: a claims sprint through the last year (and a bit ) Source: wikipedia.org
More informationCYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP
CYBER LIABILITY INSURANCE OVERVIEW FOR Prepared by: Evan Taylor NFP Targeted Industries Business Sector Financial Services 10% Non-Profit 11% Retail 10% Other 37% Other 18% Type of Data PII 40% Professional
More informationCyber Risk Mitigation
Cyber Risk Mitigation Eide Bailly Howalt + McDowell Insurance Introduction Meet your presenters Eric Pulse Risk Advisory Director 20 years in the public accounting and consulting industry providing information
More informationClient Risk Solutions Going beyond insurance. Risk solutions for Retail. Start
Client Risk Solutions Going beyond insurance Risk solutions for Retail Start Partnering to Reduce Risk Retail companies compete vigorously to deliver superior service to customers with diverse and everchanging
More informationSECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD
SECURITY INCIENT RESPONSE PEACE OF MIN IN A CHANGING WORL The insured perils Criminal abduction, assault, bribery demand, competitor malfeasance, criminal facilitation, murder, product tampering, stalking,
More informationInsuring your online world, even when you re offline. Masterpiece Cyber Protection
Insuring your online world, even when you re offline Masterpiece Cyber Protection Protect your online information from being an open network 97% of Chubb clients who had a claim paid were highly satisfied
More informationAn Overview of Cyber Insurance at AIG
An Overview of Cyber Insurance at AIG Michael Lee, MBA Cyber Business Development Manager AIG 2018 Brittney Mishler, ARM Cyber Casualty Underwriting Specialist AIG Cyber Insurance It s a peril, not a product
More informationCYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY
CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY Agenda Threat Landscape and Trends Breach Response Process Pitfalls and Critical Points BBR Services Breach Prevention
More informationS L tr lo a y t d egy s Cyber -Attack
Lloyd s Cyber-Attack Strategy 02 Introduction The focus of this paper is on insurance losses arising from malicious electronic acts, referred to throughout as cyber-attack. The malicious act is the proximate
More informationCombined Liability Insurance for Financial Technology Companies Proposal Form
Combined Liability Insurance for Financial Technology Companies Proposal Form Important Notice 1. This is a proposal for a contract of insurance, in which the 'proposer' or 'you/your' means the individual,
More informationThe Internet of Everything: Building Cyber Resilience in a Connected World
The Internet of Everything: Building Cyber Resilience in a Connected World The Internet of Things (IoT) is everywhere, ushering in a technological revolution at lightning speed. According to an Oliver
More informationClient Risk Solutions Going beyond insurance. Risk solutions for the Healthcare sector. Start
Client Risk Solutions Going beyond insurance Risk solutions for the Healthcare sector Start Partnering to Reduce Risk Healthcare and life sciences companies face a wide array of risk challenges, stemming
More informationSolving Cyber Risk. Security Metrics and Insurance. Jason Christopher March 2017
Solving Cyber Risk Security Metrics and Insurance Jason Christopher March 2017 How We Try to Address Cyber Risk What is Cyber Risk? Definitions Who should be concerned? Key categories of cyber risk Cyber
More informationCyber Insurance. How Insuretechs Can Unlock The Opportunity
Cyber Insurance How Insuretechs Can Unlock The Opportunity 1 Cyber Insurance how insuretechs can unlock the opportunity Cyber Insurance how insuretechs can unlock the opportunity 2 Not just digital, also
More informationA FRAMEWORK FOR MANAGING CYBER RISK APRIL 2015
APRIL 2015 CYBER RISK IS HERE TO STAY Even an unlimited budget for information security will not eliminate your cyber risk. Tom Reagan Marsh Cyber Practice Leader 2 SIMPLIFIED CYBER RISK MANAGEMENT FRAMEWORK
More informationLargest Risk for Public Pension Plans (Other Than Funding) Cybersecurity
Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity 2017 Public Safety Employees Pension & Benefits Conference Ronald A. King (517) 318-3015 rking@ I am convinced that there are only
More informationINSURANCE. Forensic services. Helping to protect your business from fraud, misconduct and non-compliance ADVISORY. kpmg.com/in
INSURANCE Forensic services Helping to protect your business from fraud, misconduct and non-compliance ADVISORY kpmg.com/in The insurance industry has been growing at a fast pace in India. To differentiate
More informationISO Cyber Risk Solutions
ISO Cyber Risk Solutions To help address a major issue facing today s cyber insurance market the need for more detailed underwriting and rating related information ISO developed loss costs informed by
More informationSixth Annual Benchmark Study on Privacy & Security of Healthcare Data
Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report
More informationBank of America Merrill Lynch Future of Financials Conference 2018
Bank of America Merrill Lynch Future of Financials Conference 2018 Jason Witty EVP, Chief Information Security Officer November 5, 2018 U.S. BANCORP Forward-looking Statements and Additional Information
More informationCyber Security Liability:
www.mcgrathinsurance.com Cyber Security Liability: How to protect your business from a cyber security threat or breach. 01001101011000110100011101110010011000010111010001101000001000000100100101101110011100110111
More informationJAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group
SPECIAL GUEST JAMES GRAY Underwriter, London UK Specialty Treaty Beazley Group All 6 Beazley Lloyd's Syndicates are rated A (Excellent) by A.M. Best Admitted Carrier in the US Beazley Ins Co rated A (Excellent)
More informationCyber Liability Launch Event Moscow
Allianz Global Corporate & Specialty Cyber Liability Launch Event Moscow AGCS November 2016 Cyber Insurance market Stand Alone Business USA USA Started in the early to mid 1990 s 50 Started + carriers
More informationA Field Guide to Insider Threat Helps Manage the Risk
SESSION ID: HUM-T10R A Field Guide to Threat Helps Manage the Risk Tim Casey Senior Strategic Risk Analyst Intel Corp. How do you think of insider threat? 2 The problem is becoming more complex Logos and
More informationSECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD
SECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD Criminal risks abduction, assault, bribery demand, competitor malfeasance, criminal facilitation, murder, product tampering, stalking, suspicious
More informationProtecting Against the High Cost of Cyberfraud
Protecting Against the High Cost of Cyberfraud THE ROLE OF CYBER LIABILITY INSURANCE IN YOUR RISK MANAGEMENT STRATEGY Paying the Price...2 The Ransomware Scourge...3 Policy Provisions...3 Management Liability...4
More informationred24 Special Risks - Kidnap for Ransom and Extortion Mitigation
red24 Special Risks - Kidnap for Ransom and Extortion Mitigation Table of Contents Special Risks...3 Operational Footprint...4 The Special Risks Team...4 Crisis Response Management (CRM) Centre...4 Extended
More informationCybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do
ARTICLE Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do By Gene Griggs and Saad Gul This article analyzes cybersecurity issues for retirement plans. Introduction
More informationINSURING CYBER RISKS WITH A CAPTIVE: IS IT WORTH IT?
CAPSTONE ASSOCIATED SERVICES, LTD Two Post Oak Central 1980 Post Oak Blvd., Suite 1950 Houston, TX 77056. USA Telephone: 713.800.0550 Toll-Free: 1.800.705.4014 Fax: 713.623.0329 Website: www.capstoneassociated.com
More informationProfessional Indemnity Insurance for Security Companies Proposal Form
Professional Indemnity Insurance for Security Companies Proposal Form Important Notice 1. This is a proposal for a contract of insurance. You have a legal duty to provide a fair presentation of the risk.
More informationCyber Insurance for Lawyers
Cyber Insurance for Lawyers Learn What Most People Don t Know About a Cyber Insurance Policy Cyber Crime Trends NAS Cybercrime 2017 Claims Analysis Report 1 in 4 Claims Exceeding $200,000 Average Cybercrime
More informationTONGA NATIONAL QUALIFICATIONS AND ACCREDITATION BOARD
TONGA NATIONAL QUALIFICATIONS AND ACCREDITATION BOARD RISK MANAGEMENT FRAMEWORK 2017 Overview Tonga National Qualifications and Accreditation Board (TNQAB) was established in 2004, after the Tonga National
More informationBig Data - Transforming Risk and Insurance. Driving Change
Big - Transforming Risk and Insurance George Attard Head of Aon Benfield Analytics, International Catastrophe Risk Management Market Challenges Lack of risk awareness Low disposable income High concentrations
More informationWhat can be done to mitigate cyber risk?
KEY POINTS As well as the better known hacking, cyber threats encompass a wide range of risks, the consequences of which can be severe. Banks could face regulatory sanction and may be deemed undercapitalised
More informationThe Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage
The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage James P. Bobotek james.bobotek@pillsburylaw.com (202) 663-8930 Pillsbury Winthrop Shaw Pittman LLP DOCUMENT
More informationAbout Chubb. Chubb Limited, the parent company of Chubb, is listed on the New York Stock Exchange (NYSE: CB) and is a component of the S&P 500 index.
About Chubb Chubb is the world's largest publicly traded property and casualty insurer. With operations in 54 countries, Chubb provides commercial and personal property and casualty insurance, personal
More informationSizing the Standalone Commercial Cyber Insurance Market
Sizing the Standalone Commercial Cyber Insurance Market Cyber liability is a risk that s rapidly permeating every business that relies on digital technology in some phase of its operations which means
More informationGACC MIDWEST LUNCHEON SERIES
GACC MIDWEST LUNCHEON SERIES State of the Information Security July 12, 2017 With you today Jay Schulman Principal, Great Lakes Security & Privacy Leader Focused on helping companies build and improve
More informationProfessional Indemnity Insurance for the Designing and Consulting Department of Contractors Proposal Form
Professional Indemnity Insurance for the Designing and Consulting Department of Contractors Proposal Form Important Notice 1. This is a proposal for a contract of insurance. You have a legal duty to provide
More information2016 Risk Practices Survey
Strong Board. Strong Bank. 2016 Risk Practices Survey MAR 2016 RESEARCH Sponsored by: 2 2016 RISK PRACTICES SURVEY TABLE OF CONTENTS Executive Summary 3 Risk Governance & Oversight 4 Risk Culture & Infrastructure
More informationFraud and Cyber Insurance Discussion. Will Carlin Ashley Bauer
Fraud and Cyber Insurance Discussion Will Carlin Ashley Bauer Why is it Important to Remain Vigilant? Fraud does not discriminate it occurs everywhere, and no organization is immune The changing business
More informationProfessional Indemnity Insurance for Surveyors (and related professions) Proposal Form
Professional Indemnity Insurance for Surveyors (and related professions) Proposal Form Important Notice 1. This is a proposal for a contract of insurance. You have a legal duty to provide a fair presentation
More informationCYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING
CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING 2015 Verizon Data Breach Report 79,790 security incidents 2,122 confirmed data breaches Top industries affected: Public, Information,
More informationCrawford & Company (Canada) Inc. Cyber Loss Management Program
Crawford & Company (Canada) Inc. Cyber Loss Management Program About Crawford & Company (Canada) Inc. Crawford & Company (Canada) Inc. is an independent provider of claims management solutions that has
More informationDisrupt and grow Global CEO Outlook
Disrupt and grow 2017 Global CEO Outlook Disruption as an opportunity CEOs are striving to achieve positive disruption in the market to create further opportunities for growth. 96% of Singapore CEOs are
More information41% of respondents see cybercrime as the most significant risk over the next 24 months.
Economic Crime and Fraud Survey 2018 Swiss insights Down but not out: Swiss fraudsters are digitalising and diversifying 3 of Swiss organisations experienced fraud and/or economic crime. 41% of respondents
More informationSTEPPING INTO THE BREACH A GUIDE TO CYBER AND DATA INSURANCE
STEPPING INTO THE BREACH A GUIDE TO CYBER AND DATA INSURANCE 1 A GUIDE TO CYBER AND DATA INSURANCE Cyber and data insurance helps to support and protect your business in the event of an attack. This practical
More informationNation-State Exploitation of Cryptocurrencies
SESSION ID: BAC-F02 Nation-State Exploitation of Cryptocurrencies Tom Robinson Chief Scientist and Co-Founder Elliptic @tomrobin Yaya J. Fanusie Senior Fellow Foundation for Defense of Democracies @SignCurve
More informationMEASURING & PRICING THE COST DRIVERS OF A CYBER SECURITY RISK EVENT
MEASURING & PRICING THE COST DRIVERS OF A CYBER SECURITY RISK EVENT IOWA ACTUARIES CLUB 2/25/16 EDUCATION DAY PRESENTED BY KEITH BURKHARDT, V.P. KRAUS-ANDERSON INSURANCE Overview I. Why are cyber security
More informationCYBERSECURITY AND PRIVACY: REDUCING YOUR COMPANY S LEGAL RISK. By: Andrew Serwin
CYBERSECURITY AND PRIVACY: REDUCING YOUR COMPANY S LEGAL RISK By: Andrew Serwin January 19, 2018 Overview What are companies concerned about? What information are we concerned about? Cybersecurity Who
More informationFinancial Crime Risk Management
Financial Crime Risk Management London, 30 October 2015 An essential update Academy Who we are The educational model of the Academy is that of a "Corporate University" where the traditional classroom
More informationCyber Risk Proposal Form
Cyber Risk Proposal Form Company or trading name Address Postcode Country Telephone Email Website Date business established Number of employees Do you have a Chief Privacy Officer (or Chief Information
More informationA broker guide to selling cyber insurance. CyberEdge Sales Playbook
A broker guide to selling cyber insurance CyberEdge Sales Playbook IN 5 Cyber is consistently one of the top three risks businesses face, with the average cost of a breach at approximately $4.3 million.
More informationInsuring! Agreement Claim! Scenario Coverage! Response Network &! Information! Security Liability A hacker successfully obtains sensitive, personal information from the insured s computer system. As a
More informationStructured ScenarioS
Structured ScenarioS A pilot experiment on peer structured scenario assessment Yao, Jane, American Bankers Association, JYao@aba.com Condamin, Laurent, Mstar, laurent.condamin@elseware.fr Naim, Patrick,
More informationDATA LOSS BAROMETER. A global insight into lost and stolen information
DATA LOSS BAROMETER A global insight into lost and stolen information KPMG s Data Loss Barometer exposes the latest trends and statistics for globally lost and stolen information in 2012. Over 82 countries
More informationUK Motor Insurance Insights: Managing the challenges of digital risk
REPORT UK Motor Insurance Insights: Managing the challenges of digital risk UK Insurance Underwriting Digitisation Study 2017 JULY 2017 Introduction In January 2017, LexisNexis Risk Solutions released
More informationTerrorism, Zika, CBI - Business Operations Impacted Without Physical Damage? Now What?
Terrorism, Zika, CBI - Business Operations Impacted Without Physical Damage? Now What? Introduction - Presenters Todd Cheema Senior Vice President Senior Structurer Innovative Risk Solutions Swiss Re Direct:
More informationClient Risk Solutions Going beyond insurance. Risk solutions for Energy. Oil, Gas and Petrochemical. Start
Client Risk Solutions Going beyond insurance Risk solutions for Energy Oil, Gas and Petrochemical Start Partnering to Reduce Risk AIG s Client Risk Solutions (CRS) partners with organizations to build
More informationMANAGING DATA BREACH
MANAGING DATA BREACH Beazley is a specialist insurer and leading provider of cyber insurance. Michael Phillips is a Claims Manager in the Technology, Media, and Business division of Beazley, and focuses
More informationThe working roundtable was conducted through two interdisciplinary panel sessions:
As advancements in technology enhance productivity, develop new businesses and enhance economic growth, malicious actors continue to advance as well, seeking to exploit technology for any number of criminal
More informationThe AIR Model for Terrorism
The AIR Model for Terrorism More than a decade after 9/11, terrorism remains a highly dynamic threat capable of causing significant insurance losses. The AIR model takes a probabilistic approach to estimating
More informationCyber Risk Quantification: Translating technical risks into business terms
Cyber Risk Quantification: Translating technical risks into business terms Jesper Sachmann RSA Denmark 13-06-2018 1 CYBER RISK QUANTIFICATION: TRANSLATING TECHNICAL RISKS INTO BUSINESS TERMS Jesper Sachmann
More informationProfessional Indemnity Insurance for Accountants Proposal Form
Professional Indemnity Insurance for Accountants Proposal Form Important Notice 1. This is a proposal for a contract of insurance. You have a legal duty to provide a fair presentation of the risk. Failure
More information