You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017
|
|
- Damian Gallagher
- 6 years ago
- Views:
Transcription
1 You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel
2 Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2
3 The plot thickens 2016 Barkly Survey: It s a business model that works and you don t need a lot of investment to 33% of IT professionals hacked 52% not planning security changes actually get a decent return, Tim Wellsmore, of Fireeye, a network security company 3
4 Why should you care? SYSTEM DATA LOSS EMPLOYEES REPUTATIONAL DAMAGE SUPPLIERS & PARTNERS BUSINESS INTERRUPTION 4
5 AGENDA 1. Cyber drivers 2. Dealing with it 3. Integration 4. Transfer 5
6 Cyber drivers: If you only remembered five things! 1. Introduced by connected technology, impact is primarily experienced at a business level 2. This is a pervasive risk, dealt with via programmes, not projects. 3. Management oversees risk, monitoring relevant policies and procedures, plays a significant strategic role in overseeing and interrogating response to the cyber threat. 4. Management is including cyber risk as a regular agenda item (often as a Top 5 risk ), are mandating sub-committee s (e.g. Risk, Audit)- to oversee management and response to this risk. 5. Management need to understand the defensive value chain and the link it to other macro business developments. refer to the impact factors of a cyber attack. 6
7 Cyber drivers: Tools, tactics & procedures Social engineering Password theft Ransomware & doxxing Evasion tactics Website compromise Exploits DDoS Botnets Phishing 7
8 Cyber drivers: Threat vectors Understanding your threat landscape is the start Employees Smart devices Suppliers & partners Mobile devices Customers 8
9 Reality check: Examples What do you stand to lose? Lawsuits total $1 billion. Website compromise?? Password theft R300 million ($19 million) from ATMs Social engineering Employees Target CEO & head of technology fired Employees Password theft 9
10 Cyber drivers: Accountability Board level obligation to extend due care (King IV report) Personal executive accountability Considerations: Measuring and managing it Confidentiality and regulatory frameworks Brand, reputation and market perception Security as a market differentiator Diffusion of commercial benefit 10
11 Reality check: Examples How were the Gupta s leaked? 11
12 Dealing with it 10 Key questions 1. Do we demonstrate effective management of cyber risk? 2. Do we have the right leader and talent? 3. Do we have appropriate cyber risk escalation frameworks, risk appetite, and reporting thresholds? 4. Do we focused on, and invest in the right things? If so, we evaluate and measure the results of our decisions? 5. How do our cyber risk programmes and capabilities align to our peers? 6. Do we have a cyber-focused culture, organisation wide? 7. What have we done to protect the organisation against third-party cyber risks? 8. Can we rapidly contain damages and mobilise response resources when a cyber incident occurs? 9. How do we evaluate the effectiveness of our organisation s cyber risk programme? 10. Are we a strong and secure link in the highly connected ecosystems in which we operate? Refer to Assessing cyber risk - Critical questions for the Board and C-suite. 12
13 Dealing with it In our response/approach, how have we considered: Who might attack What are they after Possible tactics Action plan Cyber program & governance 13
14 Dealing with it Risk Management driven CYBER SECURITY, MEANS THAT Risk exposure dictates the allocation of budget and effort Integrate cyber strategy with business strategy Protecting the heart of the business, critical operations Identify and protect your crown jewels, data Don t allow gaps to leave you exposed Develop a strong cybersecurity framework Nonnegotiable areas to fortify Security starts at the top: Put a senior executive at the helm 14
15 Dealing with it Managing cyber risks: Secure Vigilant Resilient Your actual defences against an attack, including everything from cybersecurity strategies to policies and procedures to systems and controls. Your early warning systems, which enable you to identify potential threats before they hit, and to quickly detect attacks and breaches as they occur. Your ability to respond quickly to attacks, and to bounce back quickly with minimal impact on your organisation, reputation and brand. Action plan 15
16 Bullet Dash Sub-bullet Integration Risk/ ORSA policy Processes & procedures Risk Appetite SAM / ERM framework Reporting structures Measuring / quantifying Risk Register 16
17 The Insurance Involvement Risk Management/ Simulations/ Environment Analysis Broker/ Benchmark Insurer - Incident Response Platform 17
18 Cyber event: the first 24 hours 1. Pre Event: risk profile analysis and landscape analysis Type of attack Pre-defined strategy 2. Pre-Event: artefact collection digital footprint What information do we have? Where is it? Pathways? What was clearly affected? 3. Event: analysis of actual incident Define strategy 18
19 Incident Response Network IT Forensics Public Relations First notification of loss Extortion Incident manager Regulatory Notification Legal Identity protection Public Notification 19
20 The Coverage Privacy Liability Wrongful disclosure of personal & corporate information Defence Expenses Legal Liability Regulatory Defence Expenses Privacy Related Fines/Penalties 20
21 The Coverage Security Liability Failure to deter a Computer Malicious act Defence Expenses Legal Liability Regulatory Defence Expenses Privacy Related Fines/Penalties 21
22 The Coverage Incident Response costs Incident Management, Forensic Investigation, Notification, Fraud Remediation, Legal Consultation, Public Relations, 22
23 The Coverage Electronic Media Content Internet media liability Defence Expenses & Legal liability for: IPR infringement Defamation/Libel/Slander Negligence 23
24 The Coverage Cyber Extortion Expense & Extortion payments arising from threats to exploit vulnerabilities or release information - Ransomware 24
25 The Coverage Business Income Loss and Recovery Costs arising from network outage BUSINESS INTERRUPTION & DATA ASSET LOSS 25
26 The Coverage BUSINESS INTERRUPTION & Recovery Costs to deal with loss/corruption of data DATA ASSET LOSS 26
27 The Coverage Caused by Computer Malicious Acts Malware & Hacking Unauthorised Use or Access Programming/ Human Error Power Failure BUSINESS INTERRUPTION & DATA ASSET LOSS 27
28 Claims examples: Ransomware Car components manufacturing company Malicious link Malware, encrypting information Demand R100,000 Incident response manager IT forensic investigator Determine whether the company can avoid paying the ransom Network Security Liability Failure of insured s network security Cyber Extortion: Costs addressing threats unless extortion monies are paid. Information technology consultant fees Incident Response Expenses Forensic investigation costs Legal consultation fees Incident Response Manager fees Data Asset Loss Costs of replacing lost/ corrupt data 28
29 Claims examples: Disparagement via Media Liability: Internal containing negative comments regarding a service provider Forwarded internally and eventually sent externally The is seen by the service provider Defamation lawsuit for harming the service provider s reputation Third party claims arising from Insured s Internet media activities. Wrongful Acts include product defamation, disparagement, trade, libel, false light, plagiarism. Defence and settlement costs for claims from service provider. Incident Response Expenses Crisis communication services Public relations expert fees to minimise reputational impact Incident response manager fees 29
30 Claims count by trigger Hack 30% Human error 18% Lost/Stolen devices 15% Rogue Employees 12% Unknown 12% Privacy Policy 6% Paper 5% Software Error 2% 30
31 Claims count by industry Healthcare 31% Professional Services 15% Technology 10% Retail 8% Financial Institutions 8% Education 7% Travel & Hospitality 6% 31
32 Cyber Claims and Industry Trends Triggers by Industry Segment Healthcare 25% 25% 20% 15% 10% 7% 18% 21% 10% Financial Institutions 37% 40% 5% 30% 19% 0% Hack Rogue Employee Lost/Stolen Devices Human Error Privacy Policy 20% 10% 7% 13% 6% 0% Hack Rogue Employee Lost/Stolen Devices Human Error Privacy Policy 32
33 Cyber Claims and Industry Trends Triggers by Industry Segment Public Entity 80% 64% 60% 40% 20% 0% 7% 11% 7% Hack Paper Human Error Unknown 12% Privacy Policy 30% 25% 20% 15% 10% Professional Services 23% 10% 26% 20% 5% 5% 0% Hack Rogue Employee Lost/Stolen Devices Human Error Privacy Policy 33
34 What is not covered? Deliberate fraud/ dishonesty (final adjudication) Rogue Employees covered Bodily Injury or Property Damage Internet service provider hosting your website (unless under your control) Acts of war Cyber Terrorism is covered Unauthorised collection of Personal Data unintentional is covered Equipment/ hardware 34
35 Considerations Capacity available in the market What limit is appropriate Quantification Follow on D&O claims Complex to understand fear of IT 35
36 Considerations cont. Condition Precedent language beware Systemic breaches a possibility Scale of losses for insurance market What is needed to quote 36
37 According to PwC s report Global Economic Crime Survey 2016, 32% of South African organisations have experienced cybercrime, and it is the fourth most reported type of economic crime in the country, and second internationally. 37
38 Why should you care? Take it seriously 38
39 So what Do you understand your risk? How much exposure do you have? Do you need to change controls or be more pro-active about training or cyber-watch? The risk is not going away, are you prepared? 39
Cyber & Privacy Liability and Technology E&0
Cyber & Privacy Liability and Technology E&0 Risks and Coverage Geoff Kinsella Partner http://map.norsecorp.com http://www.youtube.com/watch?v=f7pyhn9ic9i Presentation Overview 1. The Cyber Evolution 2.
More informationNZI LIABILITY CYBER. Are you protected?
NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is
More informationYour defence toolkit. How to combat the cyber threat
Your defence toolkit How to combat the cyber threat Contents The threat of cyber crime 4 How UK businesses are targeted 6 Case studies 8 Why cyber security is so important to manufacturers now 10 The
More informationInsuring your online world, even when you re offline. Masterpiece Cyber Protection
Insuring your online world, even when you re offline Masterpiece Cyber Protection Protect your online information from being an open network 97% of Chubb clients who had a claim paid were highly satisfied
More informationCyber Risks & Insurance
Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of
More informationCYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP
CYBER LIABILITY INSURANCE OVERVIEW FOR Prepared by: Evan Taylor NFP Targeted Industries Business Sector Financial Services 10% Non-Profit 11% Retail 10% Other 37% Other 18% Type of Data PII 40% Professional
More informationCyber-Insurance: Fraud, Waste or Abuse?
SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major
More informationA GUIDE TO CYBER RISKS COVER
A GUIDE TO CYBER RISKS COVER Cyber risk the daily business threat to SMEs Cyber risks and data security breaches are a daily threat to everyday business. Less than 10% of UK companies have cyber insurance
More informationAt the Heart of Cyber Risk Mitigation
At the Heart of Cyber Risk Mitigation De-risking Cyber Threats with Insurance Vikram Singh Abstract Management of risks is an integral part of the insurance industry. Companies have succeeded in identifying
More informationCyber breaches: are you prepared?
Cyber breaches: are you prepared? Presented by Michael Gapes, Partner Overview What is cyber crime? What are the risks and impacts to your business if you are a target? What are your responsibilities do
More informationPRIVACY AND CYBER SECURITY
PRIVACY AND CYBER SECURITY Presented by: Joe Marra, Senior Account Executive/Producer Stoya Corcoran, Assistant Vice President Presented to: CIFFA Members September 20, 2017 1 Disclaimer The information
More informationSTEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH
STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and data risks to your business,
More informationLargest Risk for Public Pension Plans (Other Than Funding) Cybersecurity
Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity 2017 Public Safety Employees Pension & Benefits Conference Ronald A. King (517) 318-3015 rking@ I am convinced that there are only
More informationSixth Annual Benchmark Study on Privacy & Security of Healthcare Data
Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report
More informationThe Continuous Evolution of the. Implications (Session Code CRM11/690)
The Continuous Evolution of the Internet of Things and Insurance Implications (Session Code CRM11/690) Speakers: Denise C. Schlitt, Director, Global Risk Management NCR Corporation Fredrik Motzfeldt -
More informationLIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE
I N S U R A N C E a g a i n s t c y b e r r i s k s After "prevention", risk covering is always the next step. Good insurance policies have the substantial merit allowing people to progress, even choosing
More informationCyber Security & Insurance Solution Karachi, Pakistan
March 2017 Cyber Security & Insurance Solution Karachi, Pakistan Ram Garg CFA, MBA Financial & Casualty Line J B Boda & Co (Singapore) Pte Ltd Karachi Insurance Institute Agenda Cyber Risk - Background
More informationJAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group
SPECIAL GUEST JAMES GRAY Underwriter, London UK Specialty Treaty Beazley Group All 6 Beazley Lloyd's Syndicates are rated A (Excellent) by A.M. Best Admitted Carrier in the US Beazley Ins Co rated A (Excellent)
More informationCyber Security Liability:
www.mcgrathinsurance.com Cyber Security Liability: How to protect your business from a cyber security threat or breach. 01001101011000110100011101110010011000010111010001101000001000000100100101101110011100110111
More informationCyber Risk Mitigation
Cyber Risk Mitigation Eide Bailly Howalt + McDowell Insurance Introduction Meet your presenters Eric Pulse Risk Advisory Director 20 years in the public accounting and consulting industry providing information
More informationCyber Insurance for Lawyers
Cyber Insurance for Lawyers Learn What Most People Don t Know About a Cyber Insurance Policy Cyber Crime Trends NAS Cybercrime 2017 Claims Analysis Report 1 in 4 Claims Exceeding $200,000 Average Cybercrime
More informationCyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby
Cyberinsurance: Necessary, Expensive and Confusing as Hell Presenters: Sharon Nelson and Judy Selby Setting the stage 2018 report from PwC one-third of US businesses have some form of cyberinsurance PwC
More informationCYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY
CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY Agenda Threat Landscape and Trends Breach Response Process Pitfalls and Critical Points BBR Services Breach Prevention
More informationChubb Cyber Enterprise Risk Management
Chubb Cyber Enterprise Risk Management Fact Sheet Financial Lines Chubb Cyber Enterprise Risk Management When it comes to a data security breach or privacy loss, it isn t a matter of if it will happen
More informationThe Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage
The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage James P. Bobotek james.bobotek@pillsburylaw.com (202) 663-8930 Pillsbury Winthrop Shaw Pittman LLP DOCUMENT
More informationCYBER INSURANCE. Tel No: E Riley Road, Riley Road Office Park, Bedfordview, Gauteng, 2008
CYBER INSURANCE CONTACT Tel No: 011 455 5105 www.cib.co.za ADDRESS 15E Riley Road, Riley Road Office Park, Bedfordview, Gauteng, 2008 (Pty) Ltd is an Authorised Financial Services Provider (FSP No. 8425).
More informationDEBUNKING MYTHS FOR CYBER INSURANCE
SESSION ID: GRC-F02 DEBUNKING MYTHS FOR CYBER INSURANCE Robert Jones Global Head of Financial Lines Specialty Claims AIG Garin Pace Cyber Product Leader AIG @Garin_Pace Introduction What Is Cyber Insurance?
More informationCyber insurance: The next frontier. Cyber insurance the next frontier
Cyber insurance the next frontier 1 Table of contents Summary 3 The Market Need 3 Cyber Risk: A Growing Concern 4 Rising Cost of Cyber Crime 5 Impact by Industry 6 Cyber Risk and Insurance 7 Cyber Risk
More informationA FRAMEWORK FOR MANAGING CYBER RISK APRIL 2015
APRIL 2015 CYBER RISK IS HERE TO STAY Even an unlimited budget for information security will not eliminate your cyber risk. Tom Reagan Marsh Cyber Practice Leader 2 SIMPLIFIED CYBER RISK MANAGEMENT FRAMEWORK
More informationHOW TO INSURE CYBER RISKS? Oulu Industry Summit
HOW TO INSURE CYBER RISKS? Oulu Industry Summit 2017 6.10.2017 Panu Peltomäki Liability and Financial Lines Practice Leader Marsh Oy Marsh A Leader in Quality, Scope, and Scale GLOBAL RISKS OF CONCERN
More informationEvaluating Your Company s Data Protection & Recovery Plan
Evaluating Your Company s Data Protection & Recovery Plan CBIA Cybersecurity Webinar Series 11AM 12PM Part V. Presented by: Stewart Tosh Charles Bellingrath Date: December 7, 2017 Today s presenters Stewart
More informationAn Overview of Cyber Insurance at AIG
An Overview of Cyber Insurance at AIG Michael Lee, MBA Cyber Business Development Manager AIG 2018 Brittney Mishler, ARM Cyber Casualty Underwriting Specialist AIG Cyber Insurance It s a peril, not a product
More informationCybersecurity Privacy and Network Security and Risk Mitigation
Ask the Experts at fi360 2016 Cybersecurity Privacy and Network Security and Risk Mitigation Gary Sutherland, NAPLIA CEO Brian Edelman, Financial Computer Inc. CEO Paul Smith, AIF NAPLIA SVP SEC s 1st
More informationSolving Cyber Risk. Security Metrics and Insurance. Jason Christopher March 2017
Solving Cyber Risk Security Metrics and Insurance Jason Christopher March 2017 How We Try to Address Cyber Risk What is Cyber Risk? Definitions Who should be concerned? Key categories of cyber risk Cyber
More informationChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them
ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them PROVIDED BY HUB INTERNATIONAL October 25th, 2016 W W W. C H I C A G O L A N D R I S K F O R U M. O R G AGENDA 1. The evolution of
More informationCyber Risks & Cyber Insurance
Cyber Risks & Cyber Insurance Terry Quested Executive Director Associated Risk Managers of Ohio Darren Faye Vice President Leonard Insurance / Assured Partners Legal Disclaimer The views, information and
More informationCyber Risk & Insurance
Cyber Risk & Insurance Digitalization in Insurance a Threat or an Opportunity Beirut, 3 & 4 May 2017 Alexander Blom - AIG 1 Today s Cyber Presentation Cyber risks insights from an insurance perspective
More informationCyber Insurance I don t think it means what you think it means
SESSION ID: GRC-T10 Cyber Insurance I don t think it means what you think it means John Loveland Global Head of Cyber Security Strategy & Marketing Verizon Enterprise Solutions Plot A brief history of
More informationHealthcare Data Breaches: Handle with Care.
Healthcare Data Breaches: Handle with Care November 13, 2012 ID Experts Webinar www.idexpertscorp.com The material presented in this presentation is not intended to provide legal or other expert advice
More informationHEALTHCARE INDUSTRY SESSION CYBER IND 011
HEALTHCARE INDUSTRY SESSION CYBER IND 011 Speakers: Jody Westby, Chief Executive Officer, Global Cyber Risk René Siemens, Partner, Covington & Burling LLP Brent Rieth, Senior Vice President and Team Leader,
More informationCyber Liability Insurance. Data Security, Privacy and Multimedia Protection
Cyber Liability Insurance Data Security, Privacy and Multimedia Protection Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such
More informationCyber Risk Proposal Form
Cyber Risk Proposal Form Company or trading name Address Postcode Country Telephone Email Website Date business established Number of employees Do you have a Chief Privacy Officer (or Chief Information
More informationCYBER INSURANCE GUIDE
CYBER INSURANCE GUIDE cfcunderwriting.com OW EXP As we become increasingly reliant on technology, the potential impact of cyber-related incidents continues to grow. Yet the cyber insurance market is relatively
More informationCyber Risks A Reinsurer s Perspective on Exposure & Claims. EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier
Cyber Risks A Reinsurer s Perspective on Exposure & Claims EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier Cyber: a claims sprint through the last year (and a bit ) Source: wikipedia.org
More informationCyber Risk Management
Cyber Risk Management Privacy & Data Protection Agenda 2 Introductions Risk Management 101 Defining & Quantifying a Breach Prevention, Mitigation & Transfer Strategies Finance Strategy- Cyber Insurance
More informationThe Internet of Everything: Building Cyber Resilience in a Connected World
The Internet of Everything: Building Cyber Resilience in a Connected World The Internet of Things (IoT) is everywhere, ushering in a technological revolution at lightning speed. According to an Oliver
More informationProtecting Against the High Cost of Cyberfraud
Protecting Against the High Cost of Cyberfraud THE ROLE OF CYBER LIABILITY INSURANCE IN YOUR RISK MANAGEMENT STRATEGY Paying the Price...2 The Ransomware Scourge...3 Policy Provisions...3 Management Liability...4
More information2015 EMEA Cyber Impact Report
Published: June 2015 2015 EMEA Cyber Impact Report The increasing cyber threat what is the true cost to business? Research independently conducted by Ponemon Institute LLC and commissioned by Aon Risk
More informationCybersecurity Insurance: New Risks and New Challenges
SESSION ID: SDS1-F01 Cybersecurity Insurance: New Risks and New Challenges Mark Weatherford Chief Cybersecurity Strategist varmour @marktw The cybersecurity market in the Asia Pacific region contributes
More informationS L tr lo a y t d egy s Cyber -Attack
Lloyd s Cyber-Attack Strategy 02 Introduction The focus of this paper is on insurance losses arising from malicious electronic acts, referred to throughout as cyber-attack. The malicious act is the proximate
More informationPersonal Information Protection Act Breach Reporting Guide
Personal Information Protection Act Breach Reporting Guide If an organization determines that a real risk of significant harm exists to an individual as a result of a breach of personal information, section
More informationTech and Cyber Claims Services
Tech and Cyber Claims Services Insurance Tech, Cyber Claims and our Breach Response Service The technology industry is a significant area of expertise for the Firm where we advise on contentious and non-contentious
More informationaustralia Canada ireland israel united kingdom United states Rest of world cfcunderwriting.com
australia Canada ireland israel united kingdom United states Rest of world CYBER PRIVATE ENTERPRISE policy document cfcunderwriting.com 1 PREAMBLE This Policy is a contract of insurance between you and
More informationT A B L E of C O N T E N T S
INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015
More informationCyber Liability Insurance for Sports Organizations
Cyber Liability Insurance for Sports Organizations The biggest threat to your organization or club isn t a loss of funds. It s a loss of data. From online sign-ups and payment systems to social media
More informationBeazley Financial Institutions
Market leading protection tailored for financial institutions, providing seamless cover from crime and professional indemnity to directors & officers and data breach. 0 1 0 0 1 1 0 0 0 1 1 0 Beazley Financial
More informationSurprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their
When It Comes to Data Breaches, Why Are Corporations Largely Uninsured? Under Attack and Unprepared: Argo Group Cyber Insurance Survey 2017 Surprisingly, only 40 percent of small and medium-sized enterprises
More informationSara Robben, Statistical Advisor National Association of Insurance Commissioners
Moderated by Daniel Eliot, Director Small Business Programs National Cyber Security Alliance Sara Robben, Statistical Advisor National Association of Insurance Commissioners Angela Gleason, Senior Counsel
More informationCyber a risk on the rise. Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist
Cyber a risk on the rise Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist Cyber data breaches reaching a new level 1 000 000 000 Source: http://money.cnn.com/2016/09/22/technology/yahoo-data-breach/
More informationCase study. Malware mayhem. A targeted ransomware attack on a technology provider opens up a can of worms
Case study Malware mayhem A targeted ransomware attack on a technology provider opens up a can of worms Ransomware is one of the fastest growing forms of cybercrime in the world. According to our own claims
More informationWhat can be done to mitigate cyber risk?
KEY POINTS As well as the better known hacking, cyber threats encompass a wide range of risks, the consequences of which can be severe. Banks could face regulatory sanction and may be deemed undercapitalised
More informationCyber Risk Insurance. Frequently Asked Questions
Cyber Risk Insurance Frequently Asked Questions Frequently Asked Questions What is Cyber Risk? Why should I buy Cyber Risk Insurance? What is the cost? Who is Great American Insurance? Why should I buy
More informationThe working roundtable was conducted through two interdisciplinary panel sessions:
As advancements in technology enhance productivity, develop new businesses and enhance economic growth, malicious actors continue to advance as well, seeking to exploit technology for any number of criminal
More informationCYBER LIABILITY INSURANCE: CLAIMS ISSUES AND TRENDS THAT AUDITORS NEED TO KNOW
CYBER LIABILITY INSURANCE: CLAIMS ISSUES AND TRENDS THAT AUDITORS NEED TO KNOW INSURANCE RISK MANAGEMENT EMPLOYEE BENEFITS Presented by: Douglas R. Jones, CPCU, ARM, Senior Vice President, Principal www.rhsb.com
More informationAdd our expertise to yours Protection from the consequences of cyber risks
CyberEdge THIS INFORMATION IS INTENDED FOR INSURANCE BROKERS AND OTHER INSURANCE PROFESSIONALS ONLY Add our expertise to yours Protection from the consequences of cyber risks What is CyberEdge? 2 CyberEdge
More informationVaco Cyber Security Panel
Vaco Cyber Security Panel ISACA Charlotte Chapter December 5 th, 2017 Vaco is an international talent solutions firm headquartered in Nashville, Tennessee, with more than 35 locations around the globe.
More informationCybersecurity Insurance: The Catalyst We've Been Waiting For
SESSION ID: CRWD-W16 Cybersecurity Insurance: The Catalyst We've Been Waiting For Mark Weatherford Chief Cybersecurity Strategist varmour @marktw Agenda Insurance challenges in the market today 10 reasons
More informationCYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner
CYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner CYBER EXPOSURE IN IF TOPICS Brief overview of If s Liability portfolio Cyber today s definition Cyber coverages
More informationCyber Enhancement Endorsement
Cyber Enhancement Endorsement What is Cyber Risk? Why should I buy Cyber Risk insurance? What is the cost? Why should I buy Great American s product? Who do I contact to learn more about Cyber Risk Insurance?
More informationCombined Liability Insurance for Financial Technology Companies Proposal Form
Combined Liability Insurance for Financial Technology Companies Proposal Form Important Notice 1. This is a proposal for a contract of insurance, in which the 'proposer' or 'you/your' means the individual,
More informationTerms and Conditions Cyber Enterprise Risk Management Insurance
Terms and Conditions Cyber Enterprise Risk Management Insurance Cyber Enterprise Risk Management Insurance Relationship of the Insurer, the Policyholder and the Insured in connection with Cyber Enterprise
More informationClosing the Gap. Cyber Security and the insurance sector. July 2017 KPMG.AE KPMG.OM
Closing the Gap Cyber Security and the insurance sector July 2017 KPMG.AE KPMG.OM The changing threat As much as new technology has provided a platform for business innovation and growth, it has also brought
More informationSTEPPING INTO THE BREACH A GUIDE TO CYBER AND DATA INSURANCE
STEPPING INTO THE BREACH A GUIDE TO CYBER AND DATA INSURANCE 1 A GUIDE TO CYBER AND DATA INSURANCE Cyber and data insurance helps to support and protect your business in the event of an attack. This practical
More informationConSept: Policy Highlights: Other Coverage Features
An ever changing and increasingly regulated business environment presents a plethora of risks and threats for Companies, who face potential litigation, financial loss, discrimination claims or on-line
More informationSlide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?
Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is
More informationMEASURING & PRICING THE COST DRIVERS OF A CYBER SECURITY RISK EVENT
MEASURING & PRICING THE COST DRIVERS OF A CYBER SECURITY RISK EVENT IOWA ACTUARIES CLUB 2/25/16 EDUCATION DAY PRESENTED BY KEITH BURKHARDT, V.P. KRAUS-ANDERSON INSURANCE Overview I. Why are cyber security
More informationMANAGING DATA BREACH
MANAGING DATA BREACH Beazley is a specialist insurer and leading provider of cyber insurance. Michael Phillips is a Claims Manager in the Technology, Media, and Business division of Beazley, and focuses
More informationCybersecurity and the Law Seminar
Cybersecurity and the Law Seminar A practical walk-through of the legal landscape, enforcement, management liability and discussions on potential real-world situations Zurich 25 September 2018 What can
More informationWhitepaper: Cyber Liability Insurance Overview
Whitepaper: Cyber Liability Insurance Overview Sponsored by the State, Local, Tribal, and Territorial Government Coordinating Council (SLTTGCC) June 2016 Contents Contents... 2 1. Introduction... 3 2.
More informationSizing the Standalone Commercial Cyber Insurance Market
Sizing the Standalone Commercial Cyber Insurance Market Cyber liability is a risk that s rapidly permeating every business that relies on digital technology in some phase of its operations which means
More informationCyber Risk. October 2017
Cyber Risk October 2017 The Cyber Landscape Dimensions to cyber risk Who is likely to target your clients Which jurisdictions do they operate in? Threat Types What is their line of business? Geography
More informationCybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do
ARTICLE Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do By Gene Griggs and Saad Gul This article analyzes cybersecurity issues for retirement plans. Introduction
More information41% of respondents see cybercrime as the most significant risk over the next 24 months.
Economic Crime and Fraud Survey 2018 Swiss insights Down but not out: Swiss fraudsters are digitalising and diversifying 3 of Swiss organisations experienced fraud and/or economic crime. 41% of respondents
More informationCyber Exposures: The Importance of Risk Identification and Transfer. Presented By: Joe Weipert
Cyber Exposures: The Importance of Risk Identification and Transfer Presented By: Joe Weipert The Complexity of Cyber Risk and its Severity My Goal Today: Getting Your Attention in 30 Minutes Average Claim
More informationUntangling the Web of Cyber Risk: An Insurance Perspective
Untangling the Web of Cyber Risk: An Insurance Perspective BCAW: May 16 th, 2017 Gregory Eskins National Cyber Practice Leader gregory.eskins@marsh.com http://funpicc.blogspot.ca/2011/04/your-password-is-incorrect-will-ferrell.html
More informationPrivacy and Data Breach Protection Modular application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
More informationManaging E-Commerce Risks
Managing E-Commerce Risks, Chartered Insurer ACII (UK), CPCU (USA), ARe (USA), ARM (USA), FIII (India). MBA Email: manoj@einsuranceprofessional.com E-Commerce and Risk Management E-Commerce is the delivery
More informationCyber Liability State of the Insurance Market & Risk Update Sept 8, ISACA North Texas
Cyber Liability State of the Insurance Market & Risk Update Sept 8, 2016 ISACA North Texas Agenda Introduction Cyber Liability Overview State of Insurance Regulatory Update Questions and Discussion 2 Speakers
More informationCyber Insurance. How Insuretechs Can Unlock The Opportunity
Cyber Insurance How Insuretechs Can Unlock The Opportunity 1 Cyber Insurance how insuretechs can unlock the opportunity Cyber Insurance how insuretechs can unlock the opportunity 2 Not just digital, also
More informationSmall business, big risk: Lack of cyber insurance is a serious threat
Small business, big risk: Lack of cyber insurance is a serious threat October 2018 Sean Kevelighan Chief Executive Officer seank@iii.org James Lynch, FCAS, MAAA Chief Actuary jamesl@iii.org Jessica McGregor
More informationCyber Liability Launch Event Moscow
Allianz Global Corporate & Specialty Cyber Liability Launch Event Moscow AGCS November 2016 Cyber Insurance market Stand Alone Business USA USA Started in the early to mid 1990 s 50 Started + carriers
More informationCyber, Data Risk and Media Insurance Application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
More informationDoes it pay to be cyber-insured
Does it pay to be cyber-insured Dr. Marie Moe Research Scientist, SINTEF ICT, @MarieGMoe Mr. Eireann Leverett Founder and CEO, Concinnity Risks, @blackswanburst @concinnityrisks Key issues Where do insurance
More informationCyber Liability A New Must Have Coverage for Your Soccer Organization
Cyber Liability A New Must Have Coverage for Your Soccer Organization Presented By: Pat Pullen Jeanne Zabuska President Underwriting Manager February 17, 2012 Why do you need Cyber Liability? Have a web
More informationThe Guide to Budgeting for Insider Threat Management
The Guide to Budgeting for Insider Threat Management The Guide to Budgeting for Insider Threat Management This guide is intended to help show you how to approach including Insider Threat Management within
More informationInsuring! Agreement Claim! Scenario Coverage! Response Network &! Information! Security Liability A hacker successfully obtains sensitive, personal information from the insured s computer system. As a
More informationUnderstanding Cyber Risk in the Dental Office. Melissa Moore Sanchez, CIC
Understanding Cyber Risk in the Dental Office Melissa Moore Sanchez, CIC Data Breaches are Escalating Between February 5, 2005 and May 26, 2012 561,465,563 records containing sensitive personal information
More informationInsurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage
Presenting a live 90-minute webinar with interactive Q&A Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage THURSDAY, OCTOBER 5, 2017 1pm Eastern 12pm Central
More informationInsurance Buyers News
Insurance Buyers News Springfield PO Box 4207, Springfield, MO 65808 Phone: 800-422-5275 417-887-3550 Fax: 417-887-3252 Rolla PO Box 1258, Rolla, MO 65402-1258 Phone: 800-364-2212 573-364-8888 Fax: 573-341-2257
More informationHIPAA AND YOU 2017 G E R A L D E MELTZER, MD MSHA
HIPAA AND YOU 2017 G E R A L D E MELTZER, MD MSHA ALLISON SHUREN, J D, MSN Financial Disclosure Gerald Meltzer is a consultant for imedicware Allison Shuren co-chairs the Life Sciences and Healthcare Regulatory
More information