The Continuous Evolution of the. Implications (Session Code CRM11/690)
|
|
- Elaine Parrish
- 5 years ago
- Views:
Transcription
1 The Continuous Evolution of the Internet of Things and Insurance Implications (Session Code CRM11/690) Speakers: Denise C. Schlitt, Director, Global Risk Management NCR Corporation Fredrik Motzfeldt - GB Industry Leader, Technology, Media & Telecommunications, Willis Towers Watson
2 Learning Objectives At the end of this session, you will know: How to prepare for the policy implications of specific risks created by IOT. What are some of the specific actions I must take? How to learn from and use other companies loss experiences to shape your ideas for managing your IOT risk How do I effectively scenario plan for an uncertain future? Lessons learned from others? How to keep up-to-date on market development around IOT risks and secure effective risk transfer/financing solutions. Where can I find effective risk transfer/insurance solutions?
3 The Continuous Evolution of the Internet of Things and Insurance Implications Today s Agenda 11:00 am 11:05 am Introduction to Speakers: Denise C. Schlitt, Director, Global Risk Management NCR Corporation ~20 minutes 11:05 am 11:30 am 25 minutes 11:30 am to 11:50 am Fredrik Motzfeldt - GB Industry Leader, Technology, Media & Telecommunications, Willis Towers Watson What is the Internet of Things: IOT An overview and future predictions Latest Trends & Risk impact for critical corporate infrastructure IOT usage Industry Case Studies The circle of risks vs opportunity. Risk Management and Insurance Implications Is Corporate and Risk Management Infrastructure ready for IOT? What are the insurance implications of IOT/connected devices? What are Insurance & Risk Management opportunities from IOT? How and where do I find effective coverage solutions and what should they look like? Future challenges
4 The Continuous Evolution of the Internet of Things and Insurance Implications
5 The IOT spreading its wings
6 The Continuous Evolution of the Internet of Things and Insurance Implications IOT can be defined as physical objects that connect to the internet through embedded systems and sensors, interacting with it to generate meaningful results and convenience to the end-user community. The IOT will help to enable an environment with the flexibility to provide services of all sorts, ranging from home automation to smart retail/logistics, and from smart environmental monitoring to smart city services. In a very short time, the IOT will have sensing, analytics and visualization tools, which can be accessed by anyone, anytime and anywhere in the world on a personal, community or a national level. The potential for it to enable any aspect of our lives is what is encouraging this idea to become established and flourish.
7 Is IOT domination' inevitable? New logic Digital does not respect boundaries! Regardless of the industry, digitisation will uncover inefficiencies and create value Anything that can be connected will be connected, smart and interactive Any resource that can be shared will be shared, rich and abundant Every product is a service waiting to happen!!
8 Is IOT domination' inevitable? New logics
9 Is IOT domination' inevitable? Enabling technologies driving the successful growth of IoT The size and cost of wireless radios has dropped tremendously. Internet Protocol V6 makes it possible to assign a communications address to billions of devices. Electronics companies are building Wi-Fi and cellular wireless connectivity into a wide range of devices (e.g., billions of wireless chips). Mobile data coverage has improved significantly with many networks offering broadband speeds. Battery technology has improved significantly, and solar recharging has been built into numerous devices.
10 The networked society is inevitable
11 Connected via the Cloud
12 IOT Industry case studies Media A First Mover Empowered Lifestyles Remote Surgery The Supply Chain Manufacturing 4.0
13 Media
14 Empowered lifestyles Collaborative culture Prefer services Are in control Always on/connected Always Informed Everything Instant Digital relations & identity FOBO
15 Remote surgery
16 The supply chain Goods tracking Autonomous ships
17 Smart manufacturing Manufacturing 4.0
18 Smart manufacturing. Manufacturing 4.0 Ten years from now, the global manufacturing sector will look nothing like it does today. Advanced manufacturing technology is rapidly transforming the global competitive landscape. The companies and nations that act now to seize its promise will thrive in the 21st century. Those who are devoted to incremental change and fail to engage in smart manufacturing will rapidly fall behind. Sujeet Chand, Chief Technology Officer, Rockwell Automation (Source; The Smart Factory Risk Management Perspectives CRO Forum, 2015
19 Risk impact for critical corporate infrastructure The security of the thing is only as secure as the network in which it operates Knowing thy body... or blind, deaf and defenceless? Disruptive technologies Pace of change is disruptive Unintentional expansion of risk ecosystem Business drivers leading to insecure IOT solutions Execution risks - BETA Activities outside defensive fence FOBO IOT = Increased pressure from external and internal threats Threat/attack vectors multiplying Traditional perils magnified Risk tolerance inaccurate Data key for delivery of critical IOT services and business Privacy and security Device ability outpacing security IOT security and ordinary people Privacy by design Reputational impact Lack of talent quality/access Intellectual property
20 Risk impact for critical corporate infrastructure A recent survey found that nearly 100 percent of today s cars include wireless technologies: May be inadequately secure, and most manufacturers may not be able to easily determine whether their vehicles have been hacked Healthcare cybersecurity is centred on data breaches and threats to patient information. Unfortunately, medical devices also present and expand threat attack surfaces, as these devices can be directly connected or implanted in a patient
21 Circle of risk vs opportunity 0. Prepare 1. Identify Risk 4. Monitor & Control 2. Assess Risk 3. Risk Response RMs to have a voice in the creation of value chain
22 Circle of risk vs opportunity success requirements 1. Know your environment/ecosystem! 2. Continually learn and evolve 3. Confidence incident and crisis response 4. IOT/cyber security as business enabler 5. Security changing to threat intelligence 6. Make sense from data - analyse 7. Establish connected & networked practices 8. Develop new risk platforms 9. Innovate the risk management function
23 Circle of risk vs opportunity - prioritize
24 Infrastructure IOT ready? Corporate Challenges: Disruption of industrial development, production and value chains Capital investments & questionable value Cyber-physical systems Legacy meeting Connected/Smart Is the back door (still) open? Undefined industry standards IOT Risks not constrained by conventional boundaries Extract value from data explosion Supply chain vulnerabilities Insufficient talent pool Risk Management Challenges: Difficulty in determining liabilities for losses Use and secure data flows Changing patterns of loss from frequency to severity Increased vulnerabilities to and severity from cyber attacks leading to technology failures Impact on foreseeable losses from traditional perils Greater potential disruption from business interruption Changing labour requirements and work environments The insider threat
25 IOT insurance implications What is the Role of Insurance in IOT Risk Management Strategy
26 IOT insurance implications Prevention Open source intelligence Technical risk assessment Scenario building and testing Access to risk management platforms Incident response planning exercises Specialist risk engineering IS27001 qualified loss prevention
27 IOT insurance implications Identification Protection Detection Response Quantification Your critical digital assets? (data, infrastructure and applications) Location & who has access to them? How are they protected? Technical controls, training and awareness, human controls, control (internal & external). How will you detect any issues? User notification or IT detection. How will you respond to an incident? Disaster Recovery & Business Continuity Plans. How would you quantify the impact?
28 IOT insurance implications Transfer IOT risk insurance implications: Distinguish between Physical Triggers (e.g. fire, flood, earthquake) Physical Outcomes (e.g. property damage, physical injury Non-Physical Triggers (e.g. hacking, virus infection, Denial of Service Attack) Physical Outcomes (e.g. property damage, physical injury) Non-Physical Triggers (e.g. hacking, virus infection, Denial of Service Attack) Non- Physical Outcomes (e.g. Interruption of IT networks, destruction / corruption of data)
29 IOT insurance implications Property Physical loss or damage to property by an insured peril. Cyber attack exclusion & Electronic Data Exclusion. Terrorism Losses and liabilities that might occur due to terrorist activities. Exclusion Loss of damage by electronic means Bodily Injury Privacy claims by employees Business Interruption Property damage Insurance Regulatory investigations General Liability Third party liability for physical property damage and bodily injury. Focused on physical loss. Regulatory penalties Cyber Extortion Crime Insurance Loss of money, securities and other property arising from the fraud or dishonesty of employees or a third party. Focused on pure financial loss rather than losses to intangible assets. IT/ Computer Insurance Covers loss of physical computer hardware. Business Interruption Loss of revenue plus additional costs. Commonly triggered in conjunction with the property policy Loss of IP Privacy claims by third parties Crisis management costs e.g. PR, IT, Forensics, Credit monitoring, Legal costs D&O Claims against D&O s for alleged wrongful acts in their capacity as Directors & Officers. Theft or loss of data Reputational Damage Errors & Omissions Professional Third party claims and defence costs arising from the insured's provision of services. May be limited to the accidental or negligent acts of the insured rather than malicious acts of third parties (e.g. hackers)
30 IOT insurance implications Response Loss investigation Response strategy implementation Emergency response support IT forensic Specialised legal support PR support Credit monitoring Legal defence cost Earnings smoothing/funding support
31 Insurance & risk management opportunities from IOT? Improved vigilance, safety & security Improved Governance & Data Create an analytics culture Claims trends analysis Change patterns and impact Remote risk monitoring and early alert systems (sensors) Automatic triggering of loss prevention actions ex. flood Predictive maintenance Resilience & Reduced Downtime Prevention Internally & Externally Improved risk dialogue & communication Build organizational resilience as part of IOT cybersecurity solutions to drive competitive advantage Enabling interoperability Extending functionality Big Data and digital channels for better informed premiums Analysis of customer specific risk exposures for bespoke solutions
32 Effective coverage solutions Conclusions Digital Enablement is already here so we re already late Its going to get more complex! What will the new Partnership Model need to look like? Risk Finance/Transfer market will need to evolve to offer solutions reflecting impact that technology/cyber has on existing perils and loss exposures Insurance solutions not reflecting reality of IOT/Technology exposure or creative use of capital markets and need to quantify the increased exposure to resolve Role of insurance & risk leadership in hyperconnected world will need to evolve
33 Effective coverage solutions? General Liability Property Crime Kidnap & Ransom! D&O Technology Professional Indemnity Terrorism Business Interruption
34 Effective coverage solutions Prevention is better than cure Especially when there is no cure! Consider transferring the risks you can t remove Consider the scope and recovery value of insurance not just the cost: The right solution may not be off the shelf or a price buy But that will depend on your particular situation Insurance can support pre, during and post incident (services on tap) Insurance is not an alternative to risk management & should be considered as part of overall cyber risk management strategy General Liability Kidnap & Ransom Technology Professional Indemnity Property Terrorism Crime! D&O Business Interruption
35 Future challenges - Action required!
You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017
You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business
More informationCyber & Privacy Liability and Technology E&0
Cyber & Privacy Liability and Technology E&0 Risks and Coverage Geoff Kinsella Partner http://map.norsecorp.com http://www.youtube.com/watch?v=f7pyhn9ic9i Presentation Overview 1. The Cyber Evolution 2.
More informationThe Internet of Everything: Building Cyber Resilience in a Connected World
The Internet of Everything: Building Cyber Resilience in a Connected World The Internet of Things (IoT) is everywhere, ushering in a technological revolution at lightning speed. According to an Oliver
More informationCyber a risk on the rise. Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist
Cyber a risk on the rise Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist Cyber data breaches reaching a new level 1 000 000 000 Source: http://money.cnn.com/2016/09/22/technology/yahoo-data-breach/
More informationAt the Heart of Cyber Risk Mitigation
At the Heart of Cyber Risk Mitigation De-risking Cyber Threats with Insurance Vikram Singh Abstract Management of risks is an integral part of the insurance industry. Companies have succeeded in identifying
More informationAn Overview of Cyber Insurance at AIG
An Overview of Cyber Insurance at AIG Michael Lee, MBA Cyber Business Development Manager AIG 2018 Brittney Mishler, ARM Cyber Casualty Underwriting Specialist AIG Cyber Insurance It s a peril, not a product
More informationA GUIDE TO CYBER RISKS COVER
A GUIDE TO CYBER RISKS COVER Cyber risk the daily business threat to SMEs Cyber risks and data security breaches are a daily threat to everyday business. Less than 10% of UK companies have cyber insurance
More informationCyber Risks A Reinsurer s Perspective on Exposure & Claims. EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier
Cyber Risks A Reinsurer s Perspective on Exposure & Claims EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier Cyber: a claims sprint through the last year (and a bit ) Source: wikipedia.org
More informationClient Risk Solutions Going beyond insurance. Risk solutions for Real Estate. Start
Client Risk Solutions Going beyond insurance Risk solutions for Real Estate Start Partnering to Reduce Risk Real estate owners, operators, managers and developers act vigorously to maintain profitability
More informationNZI LIABILITY CYBER. Are you protected?
NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is
More informationYour defence toolkit. How to combat the cyber threat
Your defence toolkit How to combat the cyber threat Contents The threat of cyber crime 4 How UK businesses are targeted 6 Case studies 8 Why cyber security is so important to manufacturers now 10 The
More informationBig Data - Transforming Risk and Insurance. Driving Change
Big - Transforming Risk and Insurance George Attard Head of Aon Benfield Analytics, International Catastrophe Risk Management Market Challenges Lack of risk awareness Low disposable income High concentrations
More informationInsuring intangible assets: Is the insurance industry keeping pace with its customers changing requirements?
Insuring intangible assets: Is the insurance industry keeping pace with its customers changing requirements? With developments in technology and the increasing value of intangible assets, does the insurance
More informationAre you ready to be an Insurer of Things? How the Internet of Things is changing the rules of the game for insurers
Are you ready to be an Insurer of Things? How the Internet of Things is changing the rules of the game for insurers The traditional business model for insurance, though still a solid source of revenue,
More informationChubb Cyber Enterprise Risk Management
Chubb Cyber Enterprise Risk Management Fact Sheet Financial Lines Chubb Cyber Enterprise Risk Management When it comes to a data security breach or privacy loss, it isn t a matter of if it will happen
More informationCybersecurity Insurance: The Catalyst We've Been Waiting For
SESSION ID: CRWD-W16 Cybersecurity Insurance: The Catalyst We've Been Waiting For Mark Weatherford Chief Cybersecurity Strategist varmour @marktw Agenda Insurance challenges in the market today 10 reasons
More informationCyber-Insurance: Fraud, Waste or Abuse?
SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major
More informationHEALTHCARE INDUSTRY SESSION CYBER IND 011
HEALTHCARE INDUSTRY SESSION CYBER IND 011 Speakers: Jody Westby, Chief Executive Officer, Global Cyber Risk René Siemens, Partner, Covington & Burling LLP Brent Rieth, Senior Vice President and Team Leader,
More information2015 EMEA Cyber Impact Report
Published: June 2015 2015 EMEA Cyber Impact Report The increasing cyber threat what is the true cost to business? Research independently conducted by Ponemon Institute LLC and commissioned by Aon Risk
More informationClient Risk Solutions Going beyond insurance. Risk solutions for Retail. Start
Client Risk Solutions Going beyond insurance Risk solutions for Retail Start Partnering to Reduce Risk Retail companies compete vigorously to deliver superior service to customers with diverse and everchanging
More informationInsuring your online world, even when you re offline. Masterpiece Cyber Protection
Insuring your online world, even when you re offline Masterpiece Cyber Protection Protect your online information from being an open network 97% of Chubb clients who had a claim paid were highly satisfied
More informationCybersecurity Insurance: New Risks and New Challenges
SESSION ID: SDS1-F01 Cybersecurity Insurance: New Risks and New Challenges Mark Weatherford Chief Cybersecurity Strategist varmour @marktw The cybersecurity market in the Asia Pacific region contributes
More informationCYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner
CYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner CYBER EXPOSURE IN IF TOPICS Brief overview of If s Liability portfolio Cyber today s definition Cyber coverages
More informationDEBUNKING MYTHS FOR CYBER INSURANCE
SESSION ID: GRC-F02 DEBUNKING MYTHS FOR CYBER INSURANCE Robert Jones Global Head of Financial Lines Specialty Claims AIG Garin Pace Cyber Product Leader AIG @Garin_Pace Introduction What Is Cyber Insurance?
More informationAdd our expertise to yours Protection from the consequences of cyber risks
CyberEdge THIS INFORMATION IS INTENDED FOR INSURANCE BROKERS AND OTHER INSURANCE PROFESSIONALS ONLY Add our expertise to yours Protection from the consequences of cyber risks What is CyberEdge? 2 CyberEdge
More informationHOW TO INSURE CYBER RISKS? Oulu Industry Summit
HOW TO INSURE CYBER RISKS? Oulu Industry Summit 2017 6.10.2017 Panu Peltomäki Liability and Financial Lines Practice Leader Marsh Oy Marsh A Leader in Quality, Scope, and Scale GLOBAL RISKS OF CONCERN
More informationThe Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage
The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage James P. Bobotek james.bobotek@pillsburylaw.com (202) 663-8930 Pillsbury Winthrop Shaw Pittman LLP DOCUMENT
More informationCyber insurance: The next frontier. Cyber insurance the next frontier
Cyber insurance the next frontier 1 Table of contents Summary 3 The Market Need 3 Cyber Risk: A Growing Concern 4 Rising Cost of Cyber Crime 5 Impact by Industry 6 Cyber Risk and Insurance 7 Cyber Risk
More informationThe Connected Home: Trends and Implications for Insurers. CAS Centennial Celebration November 10-11, 2014
The Connected Home: Trends and Implications for Insurers CAS Centennial Celebration November 10-11, 2014 Antitrust notice The Casualty Actuarial Society is committed to adhering strictly to the letter
More informationCyber Security Liability:
www.mcgrathinsurance.com Cyber Security Liability: How to protect your business from a cyber security threat or breach. 01001101011000110100011101110010011000010111010001101000001000000100100101101110011100110111
More informationEnhanced Cyber Risk Management Standards. Advance Notice of Proposed Rulemaking
Draft 11/29/16 Enhanced Cyber Risk Management Standards Advance Notice of Proposed Rulemaking The left column in the table below sets forth the general concepts that the federal banking agencies are considering
More informationRISK FACTOR ACKNOWLEDGEMENT AGREEMENT
RISK FACTOR ACKNOWLEDGEMENT AGREEMENT Risk Factors. AN INVESTMENT IN FROG PERFORMANCE, LLC. INVOLVES HIGH RISK AND SHOULD BE CONSIDERED ONLY BY PURCHASERS WHO CAN AFFORD THE LOSS OF THE ENTIRE INVESTMENT.
More information2015 Latin America Cyber Impact Report
2015 Latin America Cyber Impact Report Sponsored by Aon Risk Services Independently conducted by Ponemon Institute LLC Publication Date: June 2015 2015 Latin America Cyber Impact Report Ponemon Institute,
More informationCyber Risks & Insurance
Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of
More informationSixth Annual Benchmark Study on Privacy & Security of Healthcare Data
Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report
More informationPRIVACY AND CYBER SECURITY
PRIVACY AND CYBER SECURITY Presented by: Joe Marra, Senior Account Executive/Producer Stoya Corcoran, Assistant Vice President Presented to: CIFFA Members September 20, 2017 1 Disclaimer The information
More informationHow Blockchain Can Help Secure Connected Devices
Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com How Blockchain Can Help Secure Connected
More informationCyber breaches: are you prepared?
Cyber breaches: are you prepared? Presented by Michael Gapes, Partner Overview What is cyber crime? What are the risks and impacts to your business if you are a target? What are your responsibilities do
More informationInsurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage
Presenting a live 90-minute webinar with interactive Q&A Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage THURSDAY, OCTOBER 5, 2017 1pm Eastern 12pm Central
More informationClient Risk Solutions Going beyond insurance. Risk solutions for Financial Institutions. Start
Client Risk Solutions Going beyond insurance Risk solutions for Financial Institutions Start Partnering to Reduce Risk Financial Institutions compete vigorously to maintain profitability and deliver superior
More informationThe working roundtable was conducted through two interdisciplinary panel sessions:
As advancements in technology enhance productivity, develop new businesses and enhance economic growth, malicious actors continue to advance as well, seeking to exploit technology for any number of criminal
More informationCyber Risk Proposal Form
Cyber Risk Proposal Form Company or trading name Address Postcode Country Telephone Email Website Date business established Number of employees Do you have a Chief Privacy Officer (or Chief Information
More informationCyber Risk & Insurance
Cyber Risk & Insurance Digitalization in Insurance a Threat or an Opportunity Beirut, 3 & 4 May 2017 Alexander Blom - AIG 1 Today s Cyber Presentation Cyber risks insights from an insurance perspective
More informationClient Risk Solutions Going beyond insurance. Risk solutions for Energy. Oil, Gas and Petrochemical. Start
Client Risk Solutions Going beyond insurance Risk solutions for Energy Oil, Gas and Petrochemical Start Partnering to Reduce Risk AIG s Client Risk Solutions (CRS) partners with organizations to build
More informationCyber Insurance I don t think it means what you think it means
SESSION ID: GRC-T10 Cyber Insurance I don t think it means what you think it means John Loveland Global Head of Cyber Security Strategy & Marketing Verizon Enterprise Solutions Plot A brief history of
More informationIndustryEdge for technology companies OUR KNOWLEDGE IS YOUR EDGE
IndustryEdge for technology companies OUR KNOWLEDGE IS YOUR EDGE OUR KNOWLEDGE IS YOUR EDGE IndustryEdge At Travelers, we recognise that no two industries are the same and that dealing with the complexities
More informationLIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE
I N S U R A N C E a g a i n s t c y b e r r i s k s After "prevention", risk covering is always the next step. Good insurance policies have the substantial merit allowing people to progress, even choosing
More informationSTEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH
STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and data risks to your business,
More informationS L tr lo a y t d egy s Cyber -Attack
Lloyd s Cyber-Attack Strategy 02 Introduction The focus of this paper is on insurance losses arising from malicious electronic acts, referred to throughout as cyber-attack. The malicious act is the proximate
More informationCyber Liability Launch Event Moscow
Allianz Global Corporate & Specialty Cyber Liability Launch Event Moscow AGCS November 2016 Cyber Insurance market Stand Alone Business USA USA Started in the early to mid 1990 s 50 Started + carriers
More information2015 Letter to Our Shareholders
2015 Letter to Our Shareholders 1 From Our Chairman & CEO Pierre Nanterme DELIVERING IN FISCAL 2015 Accenture s excellent fiscal 2015 financial results reflect the successful execution of our strategy
More informationCyber Insurance. How Insuretechs Can Unlock The Opportunity
Cyber Insurance How Insuretechs Can Unlock The Opportunity 1 Cyber Insurance how insuretechs can unlock the opportunity Cyber Insurance how insuretechs can unlock the opportunity 2 Not just digital, also
More informationCyber Liability State of the Insurance Market & Risk Update Sept 8, ISACA North Texas
Cyber Liability State of the Insurance Market & Risk Update Sept 8, 2016 ISACA North Texas Agenda Introduction Cyber Liability Overview State of Insurance Regulatory Update Questions and Discussion 2 Speakers
More informationCase study. Malware mayhem. A targeted ransomware attack on a technology provider opens up a can of worms
Case study Malware mayhem A targeted ransomware attack on a technology provider opens up a can of worms Ransomware is one of the fastest growing forms of cybercrime in the world. According to our own claims
More informationChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them
ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them PROVIDED BY HUB INTERNATIONAL October 25th, 2016 W W W. C H I C A G O L A N D R I S K F O R U M. O R G AGENDA 1. The evolution of
More informationCyber Insurance for Lawyers
Cyber Insurance for Lawyers Learn What Most People Don t Know About a Cyber Insurance Policy Cyber Crime Trends NAS Cybercrime 2017 Claims Analysis Report 1 in 4 Claims Exceeding $200,000 Average Cybercrime
More informationTechnological Innovations: Challenges for Insurance Supervisors
Technological Innovations: Challenges for Insurance Supervisors 2016 IAIS Annual Conference Panel on Technological Innovation: Insurance Supervision and the Business of Insurance Asunción, Paraguay November
More informationConSept: Policy Highlights: Other Coverage Features
An ever changing and increasingly regulated business environment presents a plethora of risks and threats for Companies, who face potential litigation, financial loss, discrimination claims or on-line
More informationTHE BLOCKCHAIN DISRUPTION. INSIGHT REPORT on Blockchain prepared by The Burnie Group
THE BLOCKCHAIN DISRUPTION INSIGHT REPORT on Blockchain prepared by The Burnie Group NOVEMBER 2017 BUILDING VALUE Business networks create value. The efficiency of business networks is a function of the
More informationMaking Blockchain Real for Governments
Making Blockchain Real for Governments Networks of Trusted Data V1.0 August 8 th 2016 Page 1 Imagine if You can see all places your food has traveled from the farm to your table Before you left the auto
More informationRisk management of operations in emerging markets
Risk management of operations in emerging markets Chris Holt MBE, Towers Watson 26-27 September 2013, Brussels 2013 Towers Watson. All rights reserved. Agenda What do we do Where do we expect growth What
More informationVaco Cyber Security Panel
Vaco Cyber Security Panel ISACA Charlotte Chapter December 5 th, 2017 Vaco is an international talent solutions firm headquartered in Nashville, Tennessee, with more than 35 locations around the globe.
More informationCyber Risk Insurance. Frequently Asked Questions
Cyber Risk Insurance Frequently Asked Questions Frequently Asked Questions What is Cyber Risk? Why should I buy Cyber Risk Insurance? What is the cost? Who is Great American Insurance? Why should I buy
More informationRisk Management at Central Bank of Nepal
Risk Management at Central Bank of Nepal A. Introduction to Supervisory Risk Management Framework in Banks Nepal Rastra Bank(NRB) Act, 2058, section 35 (a) requires the NRB management is to design and
More informationT A B L E of C O N T E N T S
INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015
More informationCybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do
ARTICLE Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do By Gene Griggs and Saad Gul This article analyzes cybersecurity issues for retirement plans. Introduction
More informationClient Risk Solutions Going beyond insurance. Risk solutions for the Healthcare sector. Start
Client Risk Solutions Going beyond insurance Risk solutions for the Healthcare sector Start Partnering to Reduce Risk Healthcare and life sciences companies face a wide array of risk challenges, stemming
More informationSecond Quarter Fiscal 2018 Investor Presentation
Second Quarter Fiscal 2018 Investor Presentation Disclaimers Non-GAAP Financial Measures The presentation presents information about the Company s non-gaap revenue, non-gaap gross margin, non-gaap operating
More informationJAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group
SPECIAL GUEST JAMES GRAY Underwriter, London UK Specialty Treaty Beazley Group All 6 Beazley Lloyd's Syndicates are rated A (Excellent) by A.M. Best Admitted Carrier in the US Beazley Ins Co rated A (Excellent)
More informationSolving Cyber Risk. Security Metrics and Insurance. Jason Christopher March 2017
Solving Cyber Risk Security Metrics and Insurance Jason Christopher March 2017 How We Try to Address Cyber Risk What is Cyber Risk? Definitions Who should be concerned? Key categories of cyber risk Cyber
More informationOperational Risk Management
Operational Risk Management An Iceberg but Icebergs can melt DMF Stakeholders Forum Berlin, May 2013 Mike Williams mike.williams@mj-w.net Operational risk is: The risk of loss (financial or nonfinancial)
More informationPrivacy and Data Breach Protection Modular application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
More informationGLOBAL FINTECH HACKCELERATOR
GLOBAL FINTECH HACKCELERATOR Industry Problem Statements Version 2018.05.21 Organised by In partnership with In collaboration with Global FinTech Hackcelerator Powered by 80 Problem statements The global
More informationInnovation and the Future of Tax
Innovation and the Future of Tax Exploring new directions in the world of tax 2018 Financial Services Tax Conference July 19, 2018 kpmg.com Notices The following information is not intended to be written
More informationCARE EXPERTISE THAT WORKS FOR YOU
CARE EXPERTISE THAT WORKS FOR YOU INTRODUCING CARE FROM RSA At RSA, we know the growing Health, Care and Social sector is made up of a variety of businesses providing diverse services to meet a broad range
More informationA FRAMEWORK FOR MANAGING CYBER RISK APRIL 2015
APRIL 2015 CYBER RISK IS HERE TO STAY Even an unlimited budget for information security will not eliminate your cyber risk. Tom Reagan Marsh Cyber Practice Leader 2 SIMPLIFIED CYBER RISK MANAGEMENT FRAMEWORK
More informationClient Risk Solutions Going beyond insurance. Risk solutions for Construction. Start
Client Risk Solutions Going beyond insurance Risk solutions for Construction Start Partnering to Reduce Risk AIG s Client Risk Solutions (CRS) team builds long-term relationships with organizations to
More informationHow we manage risk. Risk philosophy. Risk policy. Risk framework
How we manage risk Risk management is integral to the daily operations of our businesses. As a multinational group with activities in over 130 countries, Naspers is exposed to a wide range of risks that
More informationDriving Profitable Growth
Driving Profitable Growth Frank Calderoni EVP and Chief Financial Officer December 7, 2012 Forward-Looking Statements This presentation contains projections and other forward-looking statements regarding
More informationCyber, Data Risk and Media Insurance Application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
More informationCyber-risk and cyber-controls:
Cyber-risk and cyber-controls: 1 Insurance alone is not enough Cyber-risk has become one of the most significant topics in boardrooms around the world. The threat is indeed, very real. Consequently, in
More informationThe Guide to Budgeting for Insider Threat Management
The Guide to Budgeting for Insider Threat Management The Guide to Budgeting for Insider Threat Management This guide is intended to help show you how to approach including Insider Threat Management within
More informationCYBERINSURANCE TRENDS AND DEVELOPMENTS
CYBERINSURANCE TRENDS AND DEVELOPMENTS What cyber risks can be covered Emerging products Recent cases, pending legislation and regulation Claims case studies INTRODUCTION TO CYBERINSURANCE Gartner defines
More informationCyber Liability: New Exposures
Cyber Liability: New Exposures Presented by: CONRAD INSURANCE 2007, 2010-2011, 2013-2014 Zywave Inc. All rights reserved. New Economy, New Exposures Business shift: Bricks and Mortar to Clicks and Orders
More informationBeazley Financial Institutions
Market leading protection tailored for financial institutions, providing seamless cover from crime and professional indemnity to directors & officers and data breach. 0 1 0 0 1 1 0 0 0 1 1 0 Beazley Financial
More information2017 MARKET REVIEW AND FORECAST
2017 MARKET REVIEW AND FORECAST SAFEGUARDING YOUR SUCCESS Executive Summary If 2016 taught us anything, the lesson would be not to rely on data for which there is no method of accounting. Put another way:
More informationSESSIONS MASTERCLASS A - 29/01/2018. Healthcare Insurance Forum
MASTERCLASS A - 29/01/2018 Building a Winning Digital Strategy for your Organisation 08:00-12:00 The world is increasingly connected through technology changing the way people think and the way business
More informationSummary of Form Changes e-md /MEDEFENSE Plus Insurance Policy (from version P1818CE-0115 to P1818CE-0716)
GENERAL CHANGES 1. Notice Provisions Summary of Form Changes e-md /MEDEFENSE Plus Insurance Policy (from version P1818CE-0115 to P1818CE-0716) a. Currently, the policy requires notice to the Underwriters
More informationTrends in Cyber-Insurance Coverage to Meet Insureds Needs
Trends in Cyber-Insurance Coverage to Meet Insureds Needs Linda Wendell Hsu Selman Breitman LLP 33 New Montgomery Street, Sixth Floor San Francisco, CA 94105 (415) 979-0400 lhsu@selmanlaw.com William A.
More information2017 Cyber Security and Data Privacy Study
RESEARCH REPORT DECEMBER 2017 2017 Cyber Security and Data Privacy Study How does your company compare? TABLE OF CONTENTS 05 How does your company compare? 06 Key findings 08 Cyber security and data privacy
More informationDigital evolution transforms the insurance. Christof Mascher KBW London / 3 March 2016
Digital evolution transforms the insurance Christof Mascher KBW London / 3 March 2016 The digital business model: Enhanced capabilities at the customer interface and along the entire value chain Identified
More informationEmerging issues of data ownership, interoperability, (re)usability and access to data, and liability
Emerging issues of data ownership, interoperability, (re)usability and access to data, and liability Liability in the area of autonomous systems and advanced robots / IoT-systems' 13 July 2017 hans.graux@timelex.eu
More informationCYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP
CYBER LIABILITY INSURANCE OVERVIEW FOR Prepared by: Evan Taylor NFP Targeted Industries Business Sector Financial Services 10% Non-Profit 11% Retail 10% Other 37% Other 18% Type of Data PII 40% Professional
More information1st Capacity Building Seminar on Enterprise Risk Management
1st Capacity Building Seminar on Enterprise Risk Management Hotel Sea Princess, Mumbai 10 th August 2018 ERM as a Business Enabler N K V Roop Kumar, EVP, Chief of Risk, Info & Cyber Security Management,
More informationEMERGING INSURANCE RISKS. Presented by Lawrence Njore Apex Reinsurance Brokers- Nairobi- Kenya
EMERGING INSURANCE RISKS Presented by Lawrence Njore Apex Reinsurance Brokers- Nairobi- Kenya EMERGING RISK DEFINITIONS Lloyds: An issue that is perceived to be potentially significant but which may not
More informationCyber Risks & Cyber Insurance
Cyber Risks & Cyber Insurance Terry Quested Executive Director Associated Risk Managers of Ohio Darren Faye Vice President Leonard Insurance / Assured Partners Legal Disclaimer The views, information and
More informationBetter-working insurance: moving blockchain from concept to reality
Better-working insurance: moving blockchain from concept to reality Imagine a different kind of insurance industry, one where all parties in the insurance value chain have the same risk data at the same
More informationCommercial Insurance >
Commercial Insurance AIG Commercial Insurance combines one of the world s farthest reaching property casualty networks with our diversified, multichannel distribution network to offer our customers a broad
More informationOccupational Health and Safety (OHS) Incident Management: The Role of Business Continuity
Occupational Health and Safety (OHS) Incident Management: The Role of Business Continuity Michael Torrance, Senior Associate, Occupational Health, Safety and Security 21 March 2013 Introduction Topics
More informationCyber Risk Quantification: Translating technical risks into business terms
Cyber Risk Quantification: Translating technical risks into business terms Jesper Sachmann RSA Denmark 13-06-2018 1 CYBER RISK QUANTIFICATION: TRANSLATING TECHNICAL RISKS INTO BUSINESS TERMS Jesper Sachmann
More information