Operational Risk in Business

Size: px
Start display at page:

Download "Operational Risk in Business"

Transcription

1 Operational Risk in Business Gavin Dyche Manager, Risk 8 March 2017

2 SESSION OVERVIEW 1. JLT Overview 2. Risk & Risk Management 3. Strategic & Operational Risk 4. Business Continuity 5. Fraud & Cyber 2

3 KEEP AN EYE OUT 3

4 1 WHO ARE JARDINE LLOYD THOMPSON

5 JLT OVERVIEW When talking about the start of the JLT Community Series What is JLT? It sounds a bit like a sandwich to me. Jonathan Brown, Nova FM 5

6 JLT OVERVIEW OUR BUSINESS 6

7 JLT OVERVIEW OUR CLIENTS 7

8 2 RISK AND RISK MANAGEMENT

9 RISK AND RISK MANAGEMENT When I grow up, I want to work in Risk Management said nobody ever! 9

10 RISK Risk = Potential of losing something of value A probability of threat or damage A situation involving exposure to danger The possibility that something unpleasant or unwelcome will happen 10

11 SOURCES OF RISK Natural Events Human Behaviour Legislative Compliance Commercial Relationships Assets & Operations Political Circumstances Technology 11

12 RISK AS OPPORTUNITY

13 WHY MANAGE RISK Risk management is about deciding which risks to take and how to manage their outcomes. There are risks and costs to a program of action. But they are far less than the long-range risks and costs of comfortable inaction. President John F. Kennedy 13

14 RISK MANAGEMENT PROCESS 14

15 RISK MANAGEMENT IS PART OF US ALL You are qualified in risk management if you have ever: o Negotiated a road crossing safely o Ridden a bike or driven a car o Booked a holiday o Raised children* * You should be up here doing the talking 15

16 GOOD RISK MANAGEMENT

17 POOR RISK MANAGEMENT

18 IN A LEAGUE OF THEIR OWN

19 RISK MANAGEMENT EXAMPLE Standard Operating Procedures / Process Map 19

20 KICK YOUR TYRES 20

21 WHEN I KICKED SOME TYRES Fraud Losses Bad debt write-offs $0 $11m 21

22 WHEN I KICKED SOME TYRES Some of the bad-debt in the names of.. Ms Anita Bath Mr Rippen Youoff Mr Hugh Jass Mr R Swyper Mrs R Slicker Lord Van Hugendong 22

23 3 STRATEGIC & OPERATIONAL RISKS

24 TYPES OF RISKS Strategic risks LINK TO EACH OTHER Operational risks Project risks 24

25 RISK AND RISK MANAGEMENT Strategic Risk = Risk that may prevent delivery of strategic objectives Risk arising from a poor strategic business decision Operational/Corporate Risk = Risks arising through provision of services inadequate or failed processes, poorly designed procedures, people (human error), systems and external events. 25

26 ARTICULATING THE RISKS Example We have a lot of problems getting the right people to do the job We train them up and then can t keep them for long What is the risk? Inability to attract and retain staff with high levels of knowledge and expertise Increased costs through churn of staff (recruitment, training, etc.) 26

27 CLASSIFYING THE RISK / RISK APPETITE 27

28 RISK PROFILE. Human Resources Financial Political Information Legal / Technology Governance Inability to attract & retain staff Risk Title Risk Title Risk Title Risk Title Risk Title Risk Title Risk Title Risk Title Risk Title Risk Title Risk Title Risk Title Risk Title Risk Title Legend High Significant Moderate Low High risk: Immediate action required Significant risk: Senior management attention required Medium risk: Management responsibility must be specified Low risk: Manage by routine procedures. 28

29 4 BUSINESS CONTINUITY

30 WHAT IS BUSINESS CONTINUITY? Business Continuity (BC) is defined as the capability of the organisation to continue delivery of products or services at acceptable predefined levels following a disruptive incident. (source: ISO 22301:2012) BCP = Business Continuity Plan BCM = Business Continuity Management ITDRP Information Technology Disaster Recovery Plan EM Emergency Management BIA Business Impact Analysis SPF Single Point of Failure 30

31 WHAT DOES IT ALL MEAN? Emergency Management Plan (EMP) Focussed on the safeguard and preservation of lives, equipment, assets and infrastructure. Business Continuity Plan (BCP) To maintain or restore at least a minimal level of service provision to those functions/services deemed critical to the continuity of the organisation. The BCP should include prioritisation. IT Disaster Recovery Plan (ITDRP) To restore or maintain technology infrastructure (enabler). 31

32 A GOOD BUSINESS CONTINUITY PLAN WILL Remove/reduce subjectivity around prioritisation of services/ functions, minimising the period of disruption to services/ functions Identify your Single Points of Failure (SPF) Provide those responsible (process owners) with a guide/reminder of what they should consider and what actions are required Provide those picking up the reigns with a fighting chance of knowing what to do and who to speak to Inform other dependencies and priorities (i.e. ITDRP)

33 A BUSINESS CONTINUITY PLAN WON T Be a manual or replacement guide for good management practice and decision making Be a script for every type of scenario which may occur Add complexity, overbearing detail and uncertainty to a situation Be something that is regarded as a on the shelf document which is relied upon for all the answers periodically.

34 5 FRAUD AND CYBER

35 FRAUD IN THE NEWS we got you!

36 WHAT ARE THE EXPERTS TELLING US? Extrapolated information recently reported by the Association of Certified Fraud Examiners that organisations lose five per cent of their annual revenue to fraud

37 CURRENT SCAMS Some impersonators are easy to spot.. Others are not!

38 PHISHING

39 RANSOMWARE

40 SKIMMING

41 VALUE OF FRAUD $114 Billion $85 Billion

42 HAVE YOU BEEN HACKED?

43 HAVE YOU BEEN HACKED?

44 SCAM STATISTICS - VICTORIA

45 DO WE QUESTION THINGS

46 DO WE QUESTION THINGS Quantum = Some All = All

47 DO WE QUESTION THINGS Quantum = 8 POWER ACTIONS All = 6 POWER ACTIONS

48 DO WE QUESTION THINGS

49 DO WE QUESTION THINGS

50 WHY DO PEOPLE COMMIT FRAUD?

51 FRAUD PREVENTION FRAMEWORK

52 FRAUD RISK ASSESSMENT

53 FROM LITTLE THINGS BIG THINGS CAN GROW A Manager allowing deviation from standard operating procedures. An employee accepting a gift from a supplier or contractor An employee taking home surplus stock

54 HOW CONTROLS FAIL T R A N S A C T I O N Check 1 Check 2 Check 3

55 IF 99% EFFECTIVE WAS GOOD ENOUGH IN LIFE 12 newborn babies given to the wrong parents each day 20,000 drug prescriptions incorrect per year No electricity worldwide for 14mins per day 930 planes falling out the sky per year Water unsafe to drink for 3 days per year

56 CYBER CRIME

57 WHAT IS YOUR RISK?

58 ASHLEY MADISON Business model of questionable morals/taste Client base of 39 million across 53 countries Gross profit of $115m in 2014 Valued in excess of $1bn 200+ employees 17,000 users per second Money generated through functionality charges and fees (i.e. removal of profile = $19)

59 ASHLEY MADISON Hacked in July 2015 and member details published online including; Names Addresses Credit card information Search history Profile pictures

60 ASHLEY MADISON $576m class action by members and significant regulatory (e.g. breach of privacy) action to follow. Hack has highlighted numerous questionable operationally deceptive procedures. Members subsequently extorted through s requesting $300USD.

61 GOVERNMENT HACKING Dropped USBs and Optical Drives in staff carpark Phishing s & Malware on USB Follow-up through fake IT support calls

62 OUTCOME 60% plugged in USB Drive 90% where branded with an official logo 22% clicked on URL in phishing 40% provided passwords over the phone

63 RECENT FRAUD CASE STUDY Change of Bank Details Scam

64 RECENT FRAUD CASE STUDY Key Facts o o o Scammer may initially contact organisation by phone impersonating known supplier requesting change of bank details. Scammer follows up in writing ( ) and attaching instruction allegedly signed by a signatory. Bank account details amended and subsequent invoices paid to new (fraudulent) details.

65 RECENT FRAUD CASE STUDY It s all in the fine detail Scammer example Gavin.Dyche@jlt.com Genuine example Gavin.Dyche@jlta.com.au Signatory info may be incorrect on closer inspection BSB is not domiciled to HQ

66 IN SUMMARY, FOR CONSIDERATION Business Continuity What are your priorities? Leverage risk management/integrate into ops. Technology What is critical, where is it stored?

67 GOLDEN EGGS KICK THE TYRES PEE N LEARN Effective Risk Management, Business Continuity, Fraud & Cyber prevention is all about foresight. There are no prizes for hindsight..

68 QUESTIONS? Gavin Dyche

A Review of Actual Fraud Cases in 2017 FRAUD REVIEW

A Review of Actual Fraud Cases in 2017 FRAUD REVIEW A Review of Actual Fraud Cases in 2017 FRAUD REVIEW Contents Introduction 3 Fraud Snapshot 4 Case Studies Credit Card Fraud 5 Business Email Compromise Fraud 6 Payroll Fraud 7 Supplier Fraud 8 Outlook

More information

Your defence toolkit. How to combat the cyber threat

Your defence toolkit. How to combat the cyber threat Your defence toolkit How to combat the cyber threat Contents The threat of cyber crime 4 How UK businesses are targeted 6 Case studies 8 Why cyber security is so important to manufacturers now 10 The

More information

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

Evaluating Your Company s Data Protection & Recovery Plan

Evaluating Your Company s Data Protection & Recovery Plan Evaluating Your Company s Data Protection & Recovery Plan CBIA Cybersecurity Webinar Series 11AM 12PM Part V. Presented by: Stewart Tosh Charles Bellingrath Date: December 7, 2017 Today s presenters Stewart

More information

Cyber-Insurance: Fraud, Waste or Abuse?

Cyber-Insurance: Fraud, Waste or Abuse? SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major

More information

Better Business Bureau

Better Business Bureau Better Business Bureau 1 Who We Are & Our Vision BBB is an unbiased non-profit organization that sets and upholds high standards for fair and honest business behavior. For more than 100 years, Better Business

More information

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and data risks to your business,

More information

INTEGRATING RISK MANAGEMENT AND BUSINESS CONTINUITY

INTEGRATING RISK MANAGEMENT AND BUSINESS CONTINUITY INTEGRATING RISK MANAGEMENT AND BUSINESS CONTINUITY June 2012 Sami Ahmed Assistant Vice President - MRC Paolo De Rosa Senior Vice President - MRC Introduction Purpose Raise your knowledge and awareness

More information

Cyber Risk Enlightenment through information risk management

Cyber Risk Enlightenment through information risk management Cyber Risk Enlightenment through information risk management www.pwc.com.au Cyber Risk Enlightenment through information risk management Managing cyber risk in a way that makes sense to everyone in the

More information

ajg.com.au Connect and join the The ultimate guide to insurance for the construction industry

ajg.com.au Connect and join the The ultimate guide to insurance for the construction industry ajg.com.au Connect and join the conversation @AJG_Australia The ultimate guide to insurance for the construction industry Contents Introduction... 3 Think Gallagher... 3 Insurance requirements for the

More information

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017 You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business

More information

Protecting Yourself from Fraud including Identity Theft Advanced Level

Protecting Yourself from Fraud including Identity Theft Advanced Level Protecting Yourself from Fraud including Identity Theft Advanced Level Fraud Fraud an intentional effort to deceive another individual for personal gain Arrests for crimes not committed Damaged financial

More information

A GUIDE TO CYBER RISKS COVER

A GUIDE TO CYBER RISKS COVER A GUIDE TO CYBER RISKS COVER Cyber risk the daily business threat to SMEs Cyber risks and data security breaches are a daily threat to everyday business. Less than 10% of UK companies have cyber insurance

More information

First Timer s Guide: Credit Cards. Used the right way, your credit card can be your new financial BFF.

First Timer s Guide: Credit Cards. Used the right way, your credit card can be your new financial BFF. First Timer s Guide: Credit Cards Used the right way, your credit card can be your new financial BFF. Like most things, with great power comes great responsibility. And credit cards are no different. Used

More information

FRAUDS, SCAMS, and SENIORS. Winston Salem Police Department Crime Prevention Unit

FRAUDS, SCAMS, and SENIORS. Winston Salem Police Department Crime Prevention Unit FRAUDS, SCAMS, and SENIORS Winston Salem Police Department Crime Prevention Unit What is a Fraud/Scam? A deliberate misrepresentation which causes another person to suffer damages, usually monetary Intentional

More information

HIPAA AND YOU 2017 G E R A L D E MELTZER, MD MSHA

HIPAA AND YOU 2017 G E R A L D E MELTZER, MD MSHA HIPAA AND YOU 2017 G E R A L D E MELTZER, MD MSHA ALLISON SHUREN, J D, MSN Financial Disclosure Gerald Meltzer is a consultant for imedicware Allison Shuren co-chairs the Life Sciences and Healthcare Regulatory

More information

January to June 2016 fraud update: Payment cards, remote banking and cheque

January to June 2016 fraud update: Payment cards, remote banking and cheque January to update: Payment cards, remote banking and cheque October 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments industry.

More information

protecting yourself Money Management SESSION #6

protecting yourself Money Management SESSION #6 Money Management SESSION #6 protecting yourself The Money Management sessions have been developed for the HSBC Opportunity Partnership in collaboration with Catch22, St Giles Trust, The Prince's Trust,

More information

PRIVACY AND CYBER SECURITY

PRIVACY AND CYBER SECURITY PRIVACY AND CYBER SECURITY Presented by: Joe Marra, Senior Account Executive/Producer Stoya Corcoran, Assistant Vice President Presented to: CIFFA Members September 20, 2017 1 Disclaimer The information

More information

Step 2: Decide Who Might be Harmed and How. Step 3: Evaluate the Risks and Decide on Precautions. Step 4: Record Your Findings and Implement Them

Step 2: Decide Who Might be Harmed and How. Step 3: Evaluate the Risks and Decide on Precautions. Step 4: Record Your Findings and Implement Them r o f t n e m e g a n a M s p k i s r i T R d n a s e r u t x i F y Awa Ris y g e t a r t ks CONTENTS Section 1: Section 2: Section 3: Introduction The Risk Management Process The Types of Risks Faced

More information

IT Risk in Credit Unions - Thematic Review Findings

IT Risk in Credit Unions - Thematic Review Findings IT Risk in Credit Unions - Thematic Review Findings January 2018 Central Bank of Ireland Findings from IT Thematic Review in Credit Unions Page 2 Table of Contents 1. Executive Summary... 3 1.1 Purpose...

More information

Commercial Crime. Are you prepared for the financial cost on your business following a Crime?

Commercial Crime. Are you prepared for the financial cost on your business following a Crime? Commercial Crime Are you prepared for the financial cost on your business following a Crime? Why buy Crime Insurance? In 2015, there were 5 million frauds, and 2.5m cyber crimes. These frauds account for

More information

How well do you really understand cyber risk?

How well do you really understand cyber risk? How well do you really understand cyber risk? We are Cyber Essentials accredited. Cyber Essentials is a governmentbacked, industry supported scheme to help organisations protect themselves against common

More information

This article has been published in PLI Current: The Journal of PLI Press, Vol. 2, No. 2, Spring 2018 ( 2018 Practising Law Institute),

This article has been published in PLI Current: The Journal of PLI Press, Vol. 2, No. 2, Spring 2018 ( 2018 Practising Law Institute), This article has been published in PLI Current: The Journal of PLI Press, Vol. 2, No. 2, Spring 2018 ( 2018 Practising Law Institute), www.pli.edu/plicurrent. PLI Current The Journal of PLI Press Vol.

More information

Congratulations! You ve decided to get to grips with your. Exploring the Basics COPYRIGHTED MATERIAL. Chapter 1

Congratulations! You ve decided to get to grips with your. Exploring the Basics COPYRIGHTED MATERIAL. Chapter 1 In This Chapter Chapter 1 Exploring the Basics Benefiting from getting a grasp on your finances Looking at your financial picture Working out how you can get out of debt Figuring out what you want from

More information

Year-end 2016 fraud update: Payment cards, remote banking and cheque

Year-end 2016 fraud update: Payment cards, remote banking and cheque Year-end 2016 update: Payment cards, remote banking and cheque 30 March 2017 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments

More information

Financial Crime: Awareness & Prevention. Jon Jarosinski

Financial Crime: Awareness & Prevention. Jon Jarosinski Financial Crime: Awareness & Prevention Jon Jarosinski 1 Objectives Current trends in financial crime How to identify scams Ways you can protect yourself Agenda ID Theft Scams & Con Schemes Credit & Debit

More information

Sara Robben, Statistical Advisor National Association of Insurance Commissioners

Sara Robben, Statistical Advisor National Association of Insurance Commissioners Moderated by Daniel Eliot, Director Small Business Programs National Cyber Security Alliance Sara Robben, Statistical Advisor National Association of Insurance Commissioners Angela Gleason, Senior Counsel

More information

Insuring your online world, even when you re offline. Masterpiece Cyber Protection

Insuring your online world, even when you re offline. Masterpiece Cyber Protection Insuring your online world, even when you re offline Masterpiece Cyber Protection Protect your online information from being an open network 97% of Chubb clients who had a claim paid were highly satisfied

More information

THE GENERAL DATA PROTECTION REGULATION

THE GENERAL DATA PROTECTION REGULATION THE GENERAL DATA PROTECTION REGULATION IMPLICATIONS FOR ORGANISATIONS IN THE MIDDLE EAST The General Data Protection Regulation (GDPR) is a major revision to data protection laws in the EU and has potential

More information

Beazley Financial Institutions

Beazley Financial Institutions Market leading protection tailored for financial institutions, providing seamless cover from crime and professional indemnity to directors & officers and data breach. 0 1 0 0 1 1 0 0 0 1 1 0 Beazley Financial

More information

Insuring! Agreement Claim! Scenario Coverage! Response Network &! Information! Security Liability A hacker successfully obtains sensitive, personal information from the insured s computer system. As a

More information

INVESTING FOR YOUR RETIREMENT. The choice is yours

INVESTING FOR YOUR RETIREMENT. The choice is yours INVESTING FOR YOUR RETIREMENT The choice is yours 2 Supporting your journey. Thinking about your retirement isn t always easy, as it can feel far away. But knowing which way you re heading can give you

More information

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT & ACCOUNT FRAUD n Minimize Risk n Vigilance Works n Fraud Prevention Tools As you probably already know one of the three major consumer credit reporting

More information

Why choose Hiscox C-Suite?

Why choose Hiscox C-Suite? HISCOX C-SUITE It s easier than ever to place your Executive Liability business with Hiscox. We offer a market-leading management liability and crime solution with clear policy language, simplified application,

More information

UK Motor Insurance Insights: Managing the challenges of digital risk

UK Motor Insurance Insights: Managing the challenges of digital risk REPORT UK Motor Insurance Insights: Managing the challenges of digital risk UK Insurance Underwriting Digitisation Study 2017 JULY 2017 Introduction In January 2017, LexisNexis Risk Solutions released

More information

ABF Anti-Bribery Policy

ABF Anti-Bribery Policy ABF Anti-Bribery Policy Introduction Associated British Foods plc (ABF) is committed to acting professionally, fairly and with integrity in all its business dealings. As part of its commitment to ethical

More information

MODULE 4 // HOW CREDITWORTHY ARE YOU? HALL OF FAME: AGES 18+

MODULE 4 // HOW CREDITWORTHY ARE YOU? HALL OF FAME: AGES 18+ MODULE 4 // HOW CREDITWORTHY ARE YOU? HALL OF FAME: AGES 18+ MODULE 4 // FINANCIAL FOOTBALL PROGRAM Financial Football is an interactive game designed to acquaint students with the personal financial management

More information

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft? Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is

More information

ASX CLEAR OPERATING RULES Guidance Note 10

ASX CLEAR OPERATING RULES Guidance Note 10 BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they

More information

Risk Management Policy

Risk Management Policy Risk Management Policy Version: 3 Board Endorsement: 11 January 2014 Last Review Date: 3 January 2014 Next Review Date: July 2014 Risk Management Policy 1 Table of Contents 1 Introduction... 3 2 Overview...

More information

Fraud and Cyber Insurance Discussion. Will Carlin Ashley Bauer

Fraud and Cyber Insurance Discussion. Will Carlin Ashley Bauer Fraud and Cyber Insurance Discussion Will Carlin Ashley Bauer Why is it Important to Remain Vigilant? Fraud does not discriminate it occurs everywhere, and no organization is immune The changing business

More information

Risk Management Policy

Risk Management Policy Risk Management Policy May 2018 Contents 1.0 Purpose... 3 2.0 Scope... 3 3.0 Risk appetite... 3 4.0 Risk management process... 4 5.0 Measuring success... 7 6.0 Review of policy... 7 Appendix A Definitions

More information

Surprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their

Surprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their When It Comes to Data Breaches, Why Are Corporations Largely Uninsured? Under Attack and Unprepared: Argo Group Cyber Insurance Survey 2017 Surprisingly, only 40 percent of small and medium-sized enterprises

More information

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY Agenda Threat Landscape and Trends Breach Response Process Pitfalls and Critical Points BBR Services Breach Prevention

More information

Creditsafe s Sage 50 App. Seamlessly integrate credit, financial and contact data into your Sage account.

Creditsafe s Sage 50 App. Seamlessly integrate credit, financial and contact data into your Sage account. Creditsafe s Sage 50 App Seamlessly integrate credit, financial and contact data into your Sage account. Did you know? There are over 1 million company changes every single day, so we update our database

More information

At the Heart of Cyber Risk Mitigation

At the Heart of Cyber Risk Mitigation At the Heart of Cyber Risk Mitigation De-risking Cyber Threats with Insurance Vikram Singh Abstract Management of risks is an integral part of the insurance industry. Companies have succeeded in identifying

More information

Identity Protection Services

Identity Protection Services Identity Protection Services Overview Why are identity protection services being provided? We believe your personal information should stay that way personal. That s why we re taking industry- leading

More information

The Business Continuity Blueprint. A practical guide to. business continuity planning. PART 1 An Introduction

The Business Continuity Blueprint. A practical guide to. business continuity planning. PART 1 An Introduction The Business Continuity Blueprint A practical guide to business continuity planning PART 1 An Introduction CONTENTS FOREWORD A practical guide to Business Continuity Planning Part 1 - An Introduction It

More information

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group SPECIAL GUEST JAMES GRAY Underwriter, London UK Specialty Treaty Beazley Group All 6 Beazley Lloyd's Syndicates are rated A (Excellent) by A.M. Best Admitted Carrier in the US Beazley Ins Co rated A (Excellent)

More information

Cyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby

Cyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby Cyberinsurance: Necessary, Expensive and Confusing as Hell Presenters: Sharon Nelson and Judy Selby Setting the stage 2018 report from PwC one-third of US businesses have some form of cyberinsurance PwC

More information

Cyber & Privacy Liability and Technology E&0

Cyber & Privacy Liability and Technology E&0 Cyber & Privacy Liability and Technology E&0 Risks and Coverage Geoff Kinsella Partner http://map.norsecorp.com http://www.youtube.com/watch?v=f7pyhn9ic9i Presentation Overview 1. The Cyber Evolution 2.

More information

Northwest Regional Data Center

Northwest Regional Data Center Northwest Regional Data Center Located in Tallahassee, Florida, NWRDC was founded in 1972 as one of four regional data centers serving State University System of Florida. We have been providing services

More information

Insuring intangible assets: Is the insurance industry keeping pace with its customers changing requirements?

Insuring intangible assets: Is the insurance industry keeping pace with its customers changing requirements? Insuring intangible assets: Is the insurance industry keeping pace with its customers changing requirements? With developments in technology and the increasing value of intangible assets, does the insurance

More information

South Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy

South Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy South Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy Reference No: CG001 Version: Version 1 Approval date 27 March 2014 Date ratified: 27 March 2014 Name of Author and Lead Jules

More information

An Update On Association Policies, Health Checks & Guidelines To A Safer Hockey Association. Lauren Woods Member Engagement & Operations

An Update On Association Policies, Health Checks & Guidelines To A Safer Hockey Association. Lauren Woods Member Engagement & Operations An Update On Association Policies, Health Checks & Guidelines To A Safer Hockey Association Lauren Woods Member Engagement & Operations Association Health Checks Issues arising from the health check: 3/27

More information

In This Issue. SMCU Presents Keep Your Coffee

In This Issue. SMCU Presents Keep Your Coffee In This Issue SMCU Presents Keep Your Coffee... Pages 1 What is Phishing and How Can You Avoid It?... Page 2 Northgate Branch Moving to Thornton Place... Page 2 Free Seminar: Retirement Income Planning...

More information

Tech and Cyber Claims Services

Tech and Cyber Claims Services Tech and Cyber Claims Services Insurance Tech, Cyber Claims and our Breach Response Service The technology industry is a significant area of expertise for the Firm where we advise on contentious and non-contentious

More information

Chubb Cyber Enterprise Risk Management

Chubb Cyber Enterprise Risk Management Chubb Cyber Enterprise Risk Management Fact Sheet Financial Lines Chubb Cyber Enterprise Risk Management When it comes to a data security breach or privacy loss, it isn t a matter of if it will happen

More information

Trading with other businesses on credit terms?

Trading with other businesses on credit terms? Invoice Finance Trading with other businesses on credit terms? Our services could help to speed up your cash flow, collect payment on your invoices and protect you from the risk of bad debts. Achieving

More information

DEBUNKING MYTHS FOR CYBER INSURANCE

DEBUNKING MYTHS FOR CYBER INSURANCE SESSION ID: GRC-F02 DEBUNKING MYTHS FOR CYBER INSURANCE Robert Jones Global Head of Financial Lines Specialty Claims AIG Garin Pace Cyber Product Leader AIG @Garin_Pace Introduction What Is Cyber Insurance?

More information

KiwiSaver advice. 7 November This guidance note is for advisers and. financial firms advising on KiwiSaver products.

KiwiSaver advice. 7 November This guidance note is for advisers and. financial firms advising on KiwiSaver products. 7 November 2016 KiwiSaver advice This guidance note is for advisers and financial firms advising on KiwiSaver products. It gives guidance on when advice is class advice, personalised advice or just information.

More information

More Than Just a DIGITAL SPRING Band-Aid CLEANING. Connie Alarcon

More Than Just a DIGITAL SPRING Band-Aid CLEANING. Connie Alarcon More Than Just a DIGITAL SPRING Band-Aid CLEANING Connie Alarcon Agenda BBB Services Complaints Check BBB Scams Health Care Fraud & Abuse Medical Identity Theft Phone Scams Better Business Bureau BBB Serving

More information

10 THINGS TO KNOW ABOUT PROFESSIONAL INDEMNITY INSURANCE A GUIDE TO PROTECTING YOUR BUSINESS

10 THINGS TO KNOW ABOUT PROFESSIONAL INDEMNITY INSURANCE A GUIDE TO PROTECTING YOUR BUSINESS 10 THINGS TO KNOW ABOUT PROFESSIONAL INDEMNITY INSURANCE A GUIDE TO PROTECTING YOUR BUSINESS 01 10 THINGS TO KNOW ABOUT PROFESSIONAL INDEMNITY INSURANCE 10 things to know about Professional Indemnity insurance

More information

Don t miss out! Register now. Want to know more? Already registered? 2017 issue 04. So what are you waiting for?

Don t miss out! Register now. Want to know more? Already registered? 2017 issue 04. So what are you waiting for? 2017 issue 04 Don t miss out! Register today for myrps. It s your own IWDC pension account. You can see how much your pension is currently worth, check your investments and much more with myrps Registering

More information

Cyber Liability Insurance for Sports Organizations

Cyber Liability Insurance for Sports Organizations Cyber Liability Insurance for Sports Organizations The biggest threat to your organization or club isn t a loss of funds. It s a loss of data. From online sign-ups and payment systems to social media

More information

Bournemouth Primary MAT Risk Management Policy

Bournemouth Primary MAT Risk Management Policy Bournemouth Primary MAT Risk Management Policy 1. Introduction The Bournemouth Primary Multi-Academy Trust (the Trust) operates a risk management system in order to identify and manage key exposures and

More information

Cyber insurance: The next frontier. Cyber insurance the next frontier

Cyber insurance: The next frontier. Cyber insurance the next frontier Cyber insurance the next frontier 1 Table of contents Summary 3 The Market Need 3 Cyber Risk: A Growing Concern 4 Rising Cost of Cyber Crime 5 Impact by Industry 6 Cyber Risk and Insurance 7 Cyber Risk

More information

I ve Got Nothing to Lose : Consumers Risk Perceptions and Protective Actions after the Equifax Data Breach

I ve Got Nothing to Lose : Consumers Risk Perceptions and Protective Actions after the Equifax Data Breach I ve Got Nothing to Lose : Consumers Risk Perceptions and Protective Actions after the Equifax Data Breach Yixin Zou, Abraham H Mhaidli, Austin McCall, Florian Schaub Who has heard of the Equifax data

More information

IRS UPDATES & Taxes. Security. Together.

IRS UPDATES & Taxes. Security. Together. IRS UPDATES & Taxes. Security. Together. Dennis Bell Senior Stakeholder Liaison CATA February 3, 2016 Issue 5: Online Tools for Tax Professionals 1 Keeping Current Preparer Guidelines 2 Other Tax Pro Links

More information

Cyber Risk Proposal Form

Cyber Risk Proposal Form Cyber Risk Proposal Form Company or trading name Address Postcode Country Telephone Email Website Date business established Number of employees Do you have a Chief Privacy Officer (or Chief Information

More information

RISK MANAGEMENT FRAMEWORK

RISK MANAGEMENT FRAMEWORK Risk Management Framework RISK MANAGEMENT FRAMEWORK Purpose This Risk Management Framework introduces St. Michael s College s approach to risk management. It includes a definition of risk, a summary of

More information

MEDICAL IDENTITY THEFT Presented by:

MEDICAL IDENTITY THEFT Presented by: MEDICAL IDENTITY THEFT Presented by: Tami Flemmer, Risk Management Director Melissa Hauer, Corporate Counsel Ernie Thurman, Security Coordinator October 8, 2014 Medical Identity Theft OVERVIEW OF PRESENTATION

More information

Cybersecurity Privacy and Network Security and Risk Mitigation

Cybersecurity Privacy and Network Security and Risk Mitigation Ask the Experts at fi360 2016 Cybersecurity Privacy and Network Security and Risk Mitigation Gary Sutherland, NAPLIA CEO Brian Edelman, Financial Computer Inc. CEO Paul Smith, AIF NAPLIA SVP SEC s 1st

More information

The General Data Protection Regulation (GDPR) Personal data in SOS International

The General Data Protection Regulation (GDPR) Personal data in SOS International The General Data Protection Regulation (GDPR) Personal data in SOS International www.sos.eu SOS International is ready for the new data protection regulation In May 2018, the General Data Protection Regulation

More information

Combined Liability Insurance for Financial Technology Companies Proposal Form

Combined Liability Insurance for Financial Technology Companies Proposal Form Combined Liability Insurance for Financial Technology Companies Proposal Form Important Notice 1. This is a proposal for a contract of insurance, in which the 'proposer' or 'you/your' means the individual,

More information

CYBER INSURANCE GUIDE

CYBER INSURANCE GUIDE CYBER INSURANCE GUIDE cfcunderwriting.com OW EXP As we become increasingly reliant on technology, the potential impact of cyber-related incidents continues to grow. Yet the cyber insurance market is relatively

More information

Protecting Against the High Cost of Cyberfraud

Protecting Against the High Cost of Cyberfraud Protecting Against the High Cost of Cyberfraud THE ROLE OF CYBER LIABILITY INSURANCE IN YOUR RISK MANAGEMENT STRATEGY Paying the Price...2 The Ransomware Scourge...3 Policy Provisions...3 Management Liability...4

More information

St.George Estate Plan

St.George Estate Plan St.George Estate Plan Making sure you have a plan in place can make a difficult time a little bit easier. Product Disclosure Statement and Policy Wording (PDS) Effective Date: 17 November 2014 Issued by:

More information

LIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE

LIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE I N S U R A N C E a g a i n s t c y b e r r i s k s After "prevention", risk covering is always the next step. Good insurance policies have the substantial merit allowing people to progress, even choosing

More information

Credit Matters Credit Concept Workshop Presentation Script (Part II of II)

Credit Matters Credit Concept Workshop Presentation Script (Part II of II) Credit Matters Credit Concept Workshop Presentation Script (Part II of II) (HAND OUT QUIZ PRIOR TO PRESENTATION) Opening Slide: WELCOME BACK TO THE SECOND PRESENTATION OF THE CREDIT CONCEPTS WORKSHOP SERIES.

More information

Guide to investment risk and return. January 2009

Guide to investment risk and return. January 2009 Guide to investment risk and return January 2009 Guide to investment risk and return This guide is designed to help you choose an asset allocation for your investment or super portfolio. It provides an

More information

Get the car you love the smart and easy way

Get the car you love the smart and easy way Get the car you love the smart and easy way Your Guide to Novated Leasing What is Novated Leasing? Novated Leasing made easy A Novated Lease is a three way agreement between you, Custom Fleet and your

More information

NZI LIABILITY CYBER. Are you protected?

NZI LIABILITY CYBER. Are you protected? NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is

More information

Cyber Insecurity - Making Sense of Payment Fraud

Cyber Insecurity - Making Sense of Payment Fraud Cyber Insecurity - Making Sense of Payment Fraud James Richardson Head of Pre-Sales & Consulting Thursday 23 February 2017 BCS, Chartered Institute for IT Businesses and Banks rely on Bottomline for domestic

More information

An executive summary should include the purpose of having a BCP for your business and highlight the key points in your plan:

An executive summary should include the purpose of having a BCP for your business and highlight the key points in your plan: A Business Continuity Plan (BCP) helps you prepare for a major disruption to your business. It puts processes and plans in place to respond to these events and enable you to limit the impact these events

More information

Building Your Future. with the Kohl s 401(k) Savings Plan. Kohl s supports planning for your financial future with increased confidence.

Building Your Future. with the Kohl s 401(k) Savings Plan. Kohl s supports planning for your financial future with increased confidence. Building Your Future with the Kohl s 401(k) Savings Plan Kohl s supports planning for your financial future with increased confidence. FINANCIAL Me? Save for Retirement? YES. THE MOST IMPORTANT REASON

More information

Data Thefts and Protecting Client Tax Information

Data Thefts and Protecting Client Tax Information Data Thefts and Protecting Client Tax Information October 20, 2015 The information contained in this presentation is current as of the date it was presented. It should not be considered official guidance.

More information

CYBER LIABILITY REINSURANCE SOLUTIONS

CYBER LIABILITY REINSURANCE SOLUTIONS CYBER LIABILITY REINSURANCE SOLUTIONS CYBER STRONG. CYBER STRONG. State-of-the-Art Protection for Growing Cyber Risks Businesses of all sizes and in every industry are experiencing an increase in cyber

More information

2017 Cyber Security and Data Privacy Study

2017 Cyber Security and Data Privacy Study RESEARCH REPORT DECEMBER 2017 2017 Cyber Security and Data Privacy Study How does your company compare? TABLE OF CONTENTS 05 How does your company compare? 06 Key findings 08 Cyber security and data privacy

More information

The Ultimate Guide to Contracting

The Ultimate Guide to Contracting The Ultimate Guide to Contracting Accountants Experts for Experts Contents About us 3 Welcome to contracting 4 The benefits of contracting How to find your first contract 5 Limited vs Umbrella 6 Limited

More information

Protec'ng Yourself from Fraud including Iden'ty The9 Advanced Level

Protec'ng Yourself from Fraud including Iden'ty The9 Advanced Level Protec'ng Yourself from Fraud including Iden'ty The9 Advanced Level Fraud Fraud an inten'onal effort to deceive another individual for personal gain Arrests for crimes not commioed Damaged financial security

More information

MS10 Regulatory Minimum Standards

MS10 Regulatory Minimum Standards MS10 Regulatory Minimum Standards Market Briefing 22 February 2016 Lloyd s 1 Agenda The Minimum Standards Self-Assessment Return MS10 Regulatory - a more detailed look at the subsets of this minimum standard

More information

An overview of the fraud threat to business, including the particular threat posed by electronic funds transfer fraud

An overview of the fraud threat to business, including the particular threat posed by electronic funds transfer fraud An overview of the fraud threat to business, including the particular threat posed by electronic funds transfer fraud Every business is susceptible to fraud But some are more susceptible than others. That

More information

Investment Online Submission Declaration form

Investment Online Submission Declaration form Submission Declaration Investment Online Submission Declaration form About this form Please use black ink and write in CAPITAL LETTERS or tick as appropriate. Any corrections must be initialled by the

More information

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report

More information

Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage

Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage Presenting a live 90-minute webinar with interactive Q&A Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage THURSDAY, OCTOBER 5, 2017 1pm Eastern 12pm Central

More information

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath...

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... UPDATE 2 October 13, 2017 Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... What could happen? The Equifax breach gave criminals access to vital personal

More information

Your Food. Our Box. Packaging Matters.

Your Food. Our Box. Packaging Matters. DECEMBER 2016 WWW.PMQ.COM Your Food. Our Box. Packaging Matters. 2017 STATE OF THE INDUSTRY ANALYSIS PAGE 38 Precinct Pizza runs its own in-house team of drivers while also using third-party services to

More information

New York State Society of Certified Public Accountants IRS Licensed in All States TAX YEAR 2015

New York State Society of Certified Public Accountants IRS Licensed in All States TAX YEAR 2015 David Gitel CPA, EA Certified Public Accountant 1560 Broadway, Suite 1210 New York, NY 10036 Phone: (212) 840-2797 Fax: (212) 840-2817 E-Mail: dgitel@aol.com New York State Society of Certified Public

More information