The Continuous Evolution of the. Implications (Session Code CRM11/690)

Size: px
Start display at page:

Download "The Continuous Evolution of the. Implications (Session Code CRM11/690)"

Transcription

1 The Continuous Evolution of the Internet of Things and Insurance Implications (Session Code CRM11/690) Speakers: Denise C. Schlitt, Director, Global Risk Management NCR Corporation Fredrik Motzfeldt - GB Industry Leader, Technology, Media & Telecommunications, Willis Towers Watson

2 Learning Objectives At the end of this session, you will know: How to prepare for the policy implications of specific risks created by IOT. What are some of the specific actions I must take? How to learn from and use other companies loss experiences to shape your ideas for managing your IOT risk How do I effectively scenario plan for an uncertain future? Lessons learned from others? How to keep up-to-date on market development around IOT risks and secure effective risk transfer/financing solutions. Where can I find effective risk transfer/insurance solutions?

3 The Continuous Evolution of the Internet of Things and Insurance Implications Today s Agenda 11:00 am 11:05 am Introduction to Speakers: Denise C. Schlitt, Director, Global Risk Management NCR Corporation ~20 minutes 11:05 am 11:30 am 25 minutes 11:30 am to 11:50 am Fredrik Motzfeldt - GB Industry Leader, Technology, Media & Telecommunications, Willis Towers Watson What is the Internet of Things: IOT An overview and future predictions Latest Trends & Risk impact for critical corporate infrastructure IOT usage Industry Case Studies The circle of risks vs opportunity. Risk Management and Insurance Implications Is Corporate and Risk Management Infrastructure ready for IOT? What are the insurance implications of IOT/connected devices? What are Insurance & Risk Management opportunities from IOT? How and where do I find effective coverage solutions and what should they look like? Future challenges

4 The Continuous Evolution of the Internet of Things and Insurance Implications

5 The IOT spreading its wings

6 The Continuous Evolution of the Internet of Things and Insurance Implications IOT can be defined as physical objects that connect to the internet through embedded systems and sensors, interacting with it to generate meaningful results and convenience to the end-user community. The IOT will help to enable an environment with the flexibility to provide services of all sorts, ranging from home automation to smart retail/logistics, and from smart environmental monitoring to smart city services. In a very short time, the IOT will have sensing, analytics and visualization tools, which can be accessed by anyone, anytime and anywhere in the world on a personal, community or a national level. The potential for it to enable any aspect of our lives is what is encouraging this idea to become established and flourish.

7 Is IOT domination' inevitable? New logic Digital does not respect boundaries! Regardless of the industry, digitisation will uncover inefficiencies and create value Anything that can be connected will be connected, smart and interactive Any resource that can be shared will be shared, rich and abundant Every product is a service waiting to happen!!

8 Is IOT domination' inevitable? New logics

9 Is IOT domination' inevitable? Enabling technologies driving the successful growth of IoT The size and cost of wireless radios has dropped tremendously. Internet Protocol V6 makes it possible to assign a communications address to billions of devices. Electronics companies are building Wi-Fi and cellular wireless connectivity into a wide range of devices (e.g., billions of wireless chips). Mobile data coverage has improved significantly with many networks offering broadband speeds. Battery technology has improved significantly, and solar recharging has been built into numerous devices.

10 The networked society is inevitable

11 Connected via the Cloud

12 IOT Industry case studies Media A First Mover Empowered Lifestyles Remote Surgery The Supply Chain Manufacturing 4.0

13 Media

14 Empowered lifestyles Collaborative culture Prefer services Are in control Always on/connected Always Informed Everything Instant Digital relations & identity FOBO

15 Remote surgery

16 The supply chain Goods tracking Autonomous ships

17 Smart manufacturing Manufacturing 4.0

18 Smart manufacturing. Manufacturing 4.0 Ten years from now, the global manufacturing sector will look nothing like it does today. Advanced manufacturing technology is rapidly transforming the global competitive landscape. The companies and nations that act now to seize its promise will thrive in the 21st century. Those who are devoted to incremental change and fail to engage in smart manufacturing will rapidly fall behind. Sujeet Chand, Chief Technology Officer, Rockwell Automation (Source; The Smart Factory Risk Management Perspectives CRO Forum, 2015

19 Risk impact for critical corporate infrastructure The security of the thing is only as secure as the network in which it operates Knowing thy body... or blind, deaf and defenceless? Disruptive technologies Pace of change is disruptive Unintentional expansion of risk ecosystem Business drivers leading to insecure IOT solutions Execution risks - BETA Activities outside defensive fence FOBO IOT = Increased pressure from external and internal threats Threat/attack vectors multiplying Traditional perils magnified Risk tolerance inaccurate Data key for delivery of critical IOT services and business Privacy and security Device ability outpacing security IOT security and ordinary people Privacy by design Reputational impact Lack of talent quality/access Intellectual property

20 Risk impact for critical corporate infrastructure A recent survey found that nearly 100 percent of today s cars include wireless technologies: May be inadequately secure, and most manufacturers may not be able to easily determine whether their vehicles have been hacked Healthcare cybersecurity is centred on data breaches and threats to patient information. Unfortunately, medical devices also present and expand threat attack surfaces, as these devices can be directly connected or implanted in a patient

21 Circle of risk vs opportunity 0. Prepare 1. Identify Risk 4. Monitor & Control 2. Assess Risk 3. Risk Response RMs to have a voice in the creation of value chain

22 Circle of risk vs opportunity success requirements 1. Know your environment/ecosystem! 2. Continually learn and evolve 3. Confidence incident and crisis response 4. IOT/cyber security as business enabler 5. Security changing to threat intelligence 6. Make sense from data - analyse 7. Establish connected & networked practices 8. Develop new risk platforms 9. Innovate the risk management function

23 Circle of risk vs opportunity - prioritize

24 Infrastructure IOT ready? Corporate Challenges: Disruption of industrial development, production and value chains Capital investments & questionable value Cyber-physical systems Legacy meeting Connected/Smart Is the back door (still) open? Undefined industry standards IOT Risks not constrained by conventional boundaries Extract value from data explosion Supply chain vulnerabilities Insufficient talent pool Risk Management Challenges: Difficulty in determining liabilities for losses Use and secure data flows Changing patterns of loss from frequency to severity Increased vulnerabilities to and severity from cyber attacks leading to technology failures Impact on foreseeable losses from traditional perils Greater potential disruption from business interruption Changing labour requirements and work environments The insider threat

25 IOT insurance implications What is the Role of Insurance in IOT Risk Management Strategy

26 IOT insurance implications Prevention Open source intelligence Technical risk assessment Scenario building and testing Access to risk management platforms Incident response planning exercises Specialist risk engineering IS27001 qualified loss prevention

27 IOT insurance implications Identification Protection Detection Response Quantification Your critical digital assets? (data, infrastructure and applications) Location & who has access to them? How are they protected? Technical controls, training and awareness, human controls, control (internal & external). How will you detect any issues? User notification or IT detection. How will you respond to an incident? Disaster Recovery & Business Continuity Plans. How would you quantify the impact?

28 IOT insurance implications Transfer IOT risk insurance implications: Distinguish between Physical Triggers (e.g. fire, flood, earthquake) Physical Outcomes (e.g. property damage, physical injury Non-Physical Triggers (e.g. hacking, virus infection, Denial of Service Attack) Physical Outcomes (e.g. property damage, physical injury) Non-Physical Triggers (e.g. hacking, virus infection, Denial of Service Attack) Non- Physical Outcomes (e.g. Interruption of IT networks, destruction / corruption of data)

29 IOT insurance implications Property Physical loss or damage to property by an insured peril. Cyber attack exclusion & Electronic Data Exclusion. Terrorism Losses and liabilities that might occur due to terrorist activities. Exclusion Loss of damage by electronic means Bodily Injury Privacy claims by employees Business Interruption Property damage Insurance Regulatory investigations General Liability Third party liability for physical property damage and bodily injury. Focused on physical loss. Regulatory penalties Cyber Extortion Crime Insurance Loss of money, securities and other property arising from the fraud or dishonesty of employees or a third party. Focused on pure financial loss rather than losses to intangible assets. IT/ Computer Insurance Covers loss of physical computer hardware. Business Interruption Loss of revenue plus additional costs. Commonly triggered in conjunction with the property policy Loss of IP Privacy claims by third parties Crisis management costs e.g. PR, IT, Forensics, Credit monitoring, Legal costs D&O Claims against D&O s for alleged wrongful acts in their capacity as Directors & Officers. Theft or loss of data Reputational Damage Errors & Omissions Professional Third party claims and defence costs arising from the insured's provision of services. May be limited to the accidental or negligent acts of the insured rather than malicious acts of third parties (e.g. hackers)

30 IOT insurance implications Response Loss investigation Response strategy implementation Emergency response support IT forensic Specialised legal support PR support Credit monitoring Legal defence cost Earnings smoothing/funding support

31 Insurance & risk management opportunities from IOT? Improved vigilance, safety & security Improved Governance & Data Create an analytics culture Claims trends analysis Change patterns and impact Remote risk monitoring and early alert systems (sensors) Automatic triggering of loss prevention actions ex. flood Predictive maintenance Resilience & Reduced Downtime Prevention Internally & Externally Improved risk dialogue & communication Build organizational resilience as part of IOT cybersecurity solutions to drive competitive advantage Enabling interoperability Extending functionality Big Data and digital channels for better informed premiums Analysis of customer specific risk exposures for bespoke solutions

32 Effective coverage solutions Conclusions Digital Enablement is already here so we re already late Its going to get more complex! What will the new Partnership Model need to look like? Risk Finance/Transfer market will need to evolve to offer solutions reflecting impact that technology/cyber has on existing perils and loss exposures Insurance solutions not reflecting reality of IOT/Technology exposure or creative use of capital markets and need to quantify the increased exposure to resolve Role of insurance & risk leadership in hyperconnected world will need to evolve

33 Effective coverage solutions? General Liability Property Crime Kidnap & Ransom! D&O Technology Professional Indemnity Terrorism Business Interruption

34 Effective coverage solutions Prevention is better than cure Especially when there is no cure! Consider transferring the risks you can t remove Consider the scope and recovery value of insurance not just the cost: The right solution may not be off the shelf or a price buy But that will depend on your particular situation Insurance can support pre, during and post incident (services on tap) Insurance is not an alternative to risk management & should be considered as part of overall cyber risk management strategy General Liability Kidnap & Ransom Technology Professional Indemnity Property Terrorism Crime! D&O Business Interruption

35 Future challenges - Action required!

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017 You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business

More information

Cyber & Privacy Liability and Technology E&0

Cyber & Privacy Liability and Technology E&0 Cyber & Privacy Liability and Technology E&0 Risks and Coverage Geoff Kinsella Partner http://map.norsecorp.com http://www.youtube.com/watch?v=f7pyhn9ic9i Presentation Overview 1. The Cyber Evolution 2.

More information

The Internet of Everything: Building Cyber Resilience in a Connected World

The Internet of Everything: Building Cyber Resilience in a Connected World The Internet of Everything: Building Cyber Resilience in a Connected World The Internet of Things (IoT) is everywhere, ushering in a technological revolution at lightning speed. According to an Oliver

More information

Cyber a risk on the rise. Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist

Cyber a risk on the rise. Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist Cyber a risk on the rise Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist Cyber data breaches reaching a new level 1 000 000 000 Source: http://money.cnn.com/2016/09/22/technology/yahoo-data-breach/

More information

At the Heart of Cyber Risk Mitigation

At the Heart of Cyber Risk Mitigation At the Heart of Cyber Risk Mitigation De-risking Cyber Threats with Insurance Vikram Singh Abstract Management of risks is an integral part of the insurance industry. Companies have succeeded in identifying

More information

An Overview of Cyber Insurance at AIG

An Overview of Cyber Insurance at AIG An Overview of Cyber Insurance at AIG Michael Lee, MBA Cyber Business Development Manager AIG 2018 Brittney Mishler, ARM Cyber Casualty Underwriting Specialist AIG Cyber Insurance It s a peril, not a product

More information

A GUIDE TO CYBER RISKS COVER

A GUIDE TO CYBER RISKS COVER A GUIDE TO CYBER RISKS COVER Cyber risk the daily business threat to SMEs Cyber risks and data security breaches are a daily threat to everyday business. Less than 10% of UK companies have cyber insurance

More information

Cyber Risks A Reinsurer s Perspective on Exposure & Claims. EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier

Cyber Risks A Reinsurer s Perspective on Exposure & Claims. EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier Cyber Risks A Reinsurer s Perspective on Exposure & Claims EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier Cyber: a claims sprint through the last year (and a bit ) Source: wikipedia.org

More information

Client Risk Solutions Going beyond insurance. Risk solutions for Real Estate. Start

Client Risk Solutions Going beyond insurance. Risk solutions for Real Estate. Start Client Risk Solutions Going beyond insurance Risk solutions for Real Estate Start Partnering to Reduce Risk Real estate owners, operators, managers and developers act vigorously to maintain profitability

More information

NZI LIABILITY CYBER. Are you protected?

NZI LIABILITY CYBER. Are you protected? NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is

More information

Your defence toolkit. How to combat the cyber threat

Your defence toolkit. How to combat the cyber threat Your defence toolkit How to combat the cyber threat Contents The threat of cyber crime 4 How UK businesses are targeted 6 Case studies 8 Why cyber security is so important to manufacturers now 10 The

More information

Big Data - Transforming Risk and Insurance. Driving Change

Big Data - Transforming Risk and Insurance. Driving Change Big - Transforming Risk and Insurance George Attard Head of Aon Benfield Analytics, International Catastrophe Risk Management Market Challenges Lack of risk awareness Low disposable income High concentrations

More information

Insuring intangible assets: Is the insurance industry keeping pace with its customers changing requirements?

Insuring intangible assets: Is the insurance industry keeping pace with its customers changing requirements? Insuring intangible assets: Is the insurance industry keeping pace with its customers changing requirements? With developments in technology and the increasing value of intangible assets, does the insurance

More information

Are you ready to be an Insurer of Things? How the Internet of Things is changing the rules of the game for insurers

Are you ready to be an Insurer of Things? How the Internet of Things is changing the rules of the game for insurers Are you ready to be an Insurer of Things? How the Internet of Things is changing the rules of the game for insurers The traditional business model for insurance, though still a solid source of revenue,

More information

Chubb Cyber Enterprise Risk Management

Chubb Cyber Enterprise Risk Management Chubb Cyber Enterprise Risk Management Fact Sheet Financial Lines Chubb Cyber Enterprise Risk Management When it comes to a data security breach or privacy loss, it isn t a matter of if it will happen

More information

Cybersecurity Insurance: The Catalyst We've Been Waiting For

Cybersecurity Insurance: The Catalyst We've Been Waiting For SESSION ID: CRWD-W16 Cybersecurity Insurance: The Catalyst We've Been Waiting For Mark Weatherford Chief Cybersecurity Strategist varmour @marktw Agenda Insurance challenges in the market today 10 reasons

More information

Cyber-Insurance: Fraud, Waste or Abuse?

Cyber-Insurance: Fraud, Waste or Abuse? SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major

More information

HEALTHCARE INDUSTRY SESSION CYBER IND 011

HEALTHCARE INDUSTRY SESSION CYBER IND 011 HEALTHCARE INDUSTRY SESSION CYBER IND 011 Speakers: Jody Westby, Chief Executive Officer, Global Cyber Risk René Siemens, Partner, Covington & Burling LLP Brent Rieth, Senior Vice President and Team Leader,

More information

2015 EMEA Cyber Impact Report

2015 EMEA Cyber Impact Report Published: June 2015 2015 EMEA Cyber Impact Report The increasing cyber threat what is the true cost to business? Research independently conducted by Ponemon Institute LLC and commissioned by Aon Risk

More information

Client Risk Solutions Going beyond insurance. Risk solutions for Retail. Start

Client Risk Solutions Going beyond insurance. Risk solutions for Retail. Start Client Risk Solutions Going beyond insurance Risk solutions for Retail Start Partnering to Reduce Risk Retail companies compete vigorously to deliver superior service to customers with diverse and everchanging

More information

Insuring your online world, even when you re offline. Masterpiece Cyber Protection

Insuring your online world, even when you re offline. Masterpiece Cyber Protection Insuring your online world, even when you re offline Masterpiece Cyber Protection Protect your online information from being an open network 97% of Chubb clients who had a claim paid were highly satisfied

More information

Cybersecurity Insurance: New Risks and New Challenges

Cybersecurity Insurance: New Risks and New Challenges SESSION ID: SDS1-F01 Cybersecurity Insurance: New Risks and New Challenges Mark Weatherford Chief Cybersecurity Strategist varmour @marktw The cybersecurity market in the Asia Pacific region contributes

More information

CYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner

CYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner CYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner CYBER EXPOSURE IN IF TOPICS Brief overview of If s Liability portfolio Cyber today s definition Cyber coverages

More information

DEBUNKING MYTHS FOR CYBER INSURANCE

DEBUNKING MYTHS FOR CYBER INSURANCE SESSION ID: GRC-F02 DEBUNKING MYTHS FOR CYBER INSURANCE Robert Jones Global Head of Financial Lines Specialty Claims AIG Garin Pace Cyber Product Leader AIG @Garin_Pace Introduction What Is Cyber Insurance?

More information

Add our expertise to yours Protection from the consequences of cyber risks

Add our expertise to yours Protection from the consequences of cyber risks CyberEdge THIS INFORMATION IS INTENDED FOR INSURANCE BROKERS AND OTHER INSURANCE PROFESSIONALS ONLY Add our expertise to yours Protection from the consequences of cyber risks What is CyberEdge? 2 CyberEdge

More information

HOW TO INSURE CYBER RISKS? Oulu Industry Summit

HOW TO INSURE CYBER RISKS? Oulu Industry Summit HOW TO INSURE CYBER RISKS? Oulu Industry Summit 2017 6.10.2017 Panu Peltomäki Liability and Financial Lines Practice Leader Marsh Oy Marsh A Leader in Quality, Scope, and Scale GLOBAL RISKS OF CONCERN

More information

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage James P. Bobotek james.bobotek@pillsburylaw.com (202) 663-8930 Pillsbury Winthrop Shaw Pittman LLP DOCUMENT

More information

Cyber insurance: The next frontier. Cyber insurance the next frontier

Cyber insurance: The next frontier. Cyber insurance the next frontier Cyber insurance the next frontier 1 Table of contents Summary 3 The Market Need 3 Cyber Risk: A Growing Concern 4 Rising Cost of Cyber Crime 5 Impact by Industry 6 Cyber Risk and Insurance 7 Cyber Risk

More information

The Connected Home: Trends and Implications for Insurers. CAS Centennial Celebration November 10-11, 2014

The Connected Home: Trends and Implications for Insurers. CAS Centennial Celebration November 10-11, 2014 The Connected Home: Trends and Implications for Insurers CAS Centennial Celebration November 10-11, 2014 Antitrust notice The Casualty Actuarial Society is committed to adhering strictly to the letter

More information

Cyber Security Liability:

Cyber Security Liability: www.mcgrathinsurance.com Cyber Security Liability: How to protect your business from a cyber security threat or breach. 01001101011000110100011101110010011000010111010001101000001000000100100101101110011100110111

More information

Enhanced Cyber Risk Management Standards. Advance Notice of Proposed Rulemaking

Enhanced Cyber Risk Management Standards. Advance Notice of Proposed Rulemaking Draft 11/29/16 Enhanced Cyber Risk Management Standards Advance Notice of Proposed Rulemaking The left column in the table below sets forth the general concepts that the federal banking agencies are considering

More information

RISK FACTOR ACKNOWLEDGEMENT AGREEMENT

RISK FACTOR ACKNOWLEDGEMENT AGREEMENT RISK FACTOR ACKNOWLEDGEMENT AGREEMENT Risk Factors. AN INVESTMENT IN FROG PERFORMANCE, LLC. INVOLVES HIGH RISK AND SHOULD BE CONSIDERED ONLY BY PURCHASERS WHO CAN AFFORD THE LOSS OF THE ENTIRE INVESTMENT.

More information

2015 Latin America Cyber Impact Report

2015 Latin America Cyber Impact Report 2015 Latin America Cyber Impact Report Sponsored by Aon Risk Services Independently conducted by Ponemon Institute LLC Publication Date: June 2015 2015 Latin America Cyber Impact Report Ponemon Institute,

More information

Cyber Risks & Insurance

Cyber Risks & Insurance Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of

More information

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report

More information

PRIVACY AND CYBER SECURITY

PRIVACY AND CYBER SECURITY PRIVACY AND CYBER SECURITY Presented by: Joe Marra, Senior Account Executive/Producer Stoya Corcoran, Assistant Vice President Presented to: CIFFA Members September 20, 2017 1 Disclaimer The information

More information

How Blockchain Can Help Secure Connected Devices

How Blockchain Can Help Secure Connected Devices Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com How Blockchain Can Help Secure Connected

More information

Cyber breaches: are you prepared?

Cyber breaches: are you prepared? Cyber breaches: are you prepared? Presented by Michael Gapes, Partner Overview What is cyber crime? What are the risks and impacts to your business if you are a target? What are your responsibilities do

More information

Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage

Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage Presenting a live 90-minute webinar with interactive Q&A Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage THURSDAY, OCTOBER 5, 2017 1pm Eastern 12pm Central

More information

Client Risk Solutions Going beyond insurance. Risk solutions for Financial Institutions. Start

Client Risk Solutions Going beyond insurance. Risk solutions for Financial Institutions. Start Client Risk Solutions Going beyond insurance Risk solutions for Financial Institutions Start Partnering to Reduce Risk Financial Institutions compete vigorously to maintain profitability and deliver superior

More information

The working roundtable was conducted through two interdisciplinary panel sessions:

The working roundtable was conducted through two interdisciplinary panel sessions: As advancements in technology enhance productivity, develop new businesses and enhance economic growth, malicious actors continue to advance as well, seeking to exploit technology for any number of criminal

More information

Cyber Risk Proposal Form

Cyber Risk Proposal Form Cyber Risk Proposal Form Company or trading name Address Postcode Country Telephone Email Website Date business established Number of employees Do you have a Chief Privacy Officer (or Chief Information

More information

Cyber Risk & Insurance

Cyber Risk & Insurance Cyber Risk & Insurance Digitalization in Insurance a Threat or an Opportunity Beirut, 3 & 4 May 2017 Alexander Blom - AIG 1 Today s Cyber Presentation Cyber risks insights from an insurance perspective

More information

Client Risk Solutions Going beyond insurance. Risk solutions for Energy. Oil, Gas and Petrochemical. Start

Client Risk Solutions Going beyond insurance. Risk solutions for Energy. Oil, Gas and Petrochemical. Start Client Risk Solutions Going beyond insurance Risk solutions for Energy Oil, Gas and Petrochemical Start Partnering to Reduce Risk AIG s Client Risk Solutions (CRS) partners with organizations to build

More information

Cyber Insurance I don t think it means what you think it means

Cyber Insurance I don t think it means what you think it means SESSION ID: GRC-T10 Cyber Insurance I don t think it means what you think it means John Loveland Global Head of Cyber Security Strategy & Marketing Verizon Enterprise Solutions Plot A brief history of

More information

IndustryEdge for technology companies OUR KNOWLEDGE IS YOUR EDGE

IndustryEdge for technology companies OUR KNOWLEDGE IS YOUR EDGE IndustryEdge for technology companies OUR KNOWLEDGE IS YOUR EDGE OUR KNOWLEDGE IS YOUR EDGE IndustryEdge At Travelers, we recognise that no two industries are the same and that dealing with the complexities

More information

LIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE

LIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE I N S U R A N C E a g a i n s t c y b e r r i s k s After "prevention", risk covering is always the next step. Good insurance policies have the substantial merit allowing people to progress, even choosing

More information

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and data risks to your business,

More information

S L tr lo a y t d egy s Cyber -Attack

S L tr lo a y t d egy s Cyber -Attack Lloyd s Cyber-Attack Strategy 02 Introduction The focus of this paper is on insurance losses arising from malicious electronic acts, referred to throughout as cyber-attack. The malicious act is the proximate

More information

Cyber Liability Launch Event Moscow

Cyber Liability Launch Event Moscow Allianz Global Corporate & Specialty Cyber Liability Launch Event Moscow AGCS November 2016 Cyber Insurance market Stand Alone Business USA USA Started in the early to mid 1990 s 50 Started + carriers

More information

2015 Letter to Our Shareholders

2015 Letter to Our Shareholders 2015 Letter to Our Shareholders 1 From Our Chairman & CEO Pierre Nanterme DELIVERING IN FISCAL 2015 Accenture s excellent fiscal 2015 financial results reflect the successful execution of our strategy

More information

Cyber Insurance. How Insuretechs Can Unlock The Opportunity

Cyber Insurance. How Insuretechs Can Unlock The Opportunity Cyber Insurance How Insuretechs Can Unlock The Opportunity 1 Cyber Insurance how insuretechs can unlock the opportunity Cyber Insurance how insuretechs can unlock the opportunity 2 Not just digital, also

More information

Cyber Liability State of the Insurance Market & Risk Update Sept 8, ISACA North Texas

Cyber Liability State of the Insurance Market & Risk Update Sept 8, ISACA North Texas Cyber Liability State of the Insurance Market & Risk Update Sept 8, 2016 ISACA North Texas Agenda Introduction Cyber Liability Overview State of Insurance Regulatory Update Questions and Discussion 2 Speakers

More information

Case study. Malware mayhem. A targeted ransomware attack on a technology provider opens up a can of worms

Case study. Malware mayhem. A targeted ransomware attack on a technology provider opens up a can of worms Case study Malware mayhem A targeted ransomware attack on a technology provider opens up a can of worms Ransomware is one of the fastest growing forms of cybercrime in the world. According to our own claims

More information

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them PROVIDED BY HUB INTERNATIONAL October 25th, 2016 W W W. C H I C A G O L A N D R I S K F O R U M. O R G AGENDA 1. The evolution of

More information

Cyber Insurance for Lawyers

Cyber Insurance for Lawyers Cyber Insurance for Lawyers Learn What Most People Don t Know About a Cyber Insurance Policy Cyber Crime Trends NAS Cybercrime 2017 Claims Analysis Report 1 in 4 Claims Exceeding $200,000 Average Cybercrime

More information

Technological Innovations: Challenges for Insurance Supervisors

Technological Innovations: Challenges for Insurance Supervisors Technological Innovations: Challenges for Insurance Supervisors 2016 IAIS Annual Conference Panel on Technological Innovation: Insurance Supervision and the Business of Insurance Asunción, Paraguay November

More information

ConSept: Policy Highlights: Other Coverage Features

ConSept: Policy Highlights: Other Coverage Features An ever changing and increasingly regulated business environment presents a plethora of risks and threats for Companies, who face potential litigation, financial loss, discrimination claims or on-line

More information

THE BLOCKCHAIN DISRUPTION. INSIGHT REPORT on Blockchain prepared by The Burnie Group

THE BLOCKCHAIN DISRUPTION. INSIGHT REPORT on Blockchain prepared by The Burnie Group THE BLOCKCHAIN DISRUPTION INSIGHT REPORT on Blockchain prepared by The Burnie Group NOVEMBER 2017 BUILDING VALUE Business networks create value. The efficiency of business networks is a function of the

More information

Making Blockchain Real for Governments

Making Blockchain Real for Governments Making Blockchain Real for Governments Networks of Trusted Data V1.0 August 8 th 2016 Page 1 Imagine if You can see all places your food has traveled from the farm to your table Before you left the auto

More information

Risk management of operations in emerging markets

Risk management of operations in emerging markets Risk management of operations in emerging markets Chris Holt MBE, Towers Watson 26-27 September 2013, Brussels 2013 Towers Watson. All rights reserved. Agenda What do we do Where do we expect growth What

More information

Vaco Cyber Security Panel

Vaco Cyber Security Panel Vaco Cyber Security Panel ISACA Charlotte Chapter December 5 th, 2017 Vaco is an international talent solutions firm headquartered in Nashville, Tennessee, with more than 35 locations around the globe.

More information

Cyber Risk Insurance. Frequently Asked Questions

Cyber Risk Insurance. Frequently Asked Questions Cyber Risk Insurance Frequently Asked Questions Frequently Asked Questions What is Cyber Risk? Why should I buy Cyber Risk Insurance? What is the cost? Who is Great American Insurance? Why should I buy

More information

Risk Management at Central Bank of Nepal

Risk Management at Central Bank of Nepal Risk Management at Central Bank of Nepal A. Introduction to Supervisory Risk Management Framework in Banks Nepal Rastra Bank(NRB) Act, 2058, section 35 (a) requires the NRB management is to design and

More information

T A B L E of C O N T E N T S

T A B L E of C O N T E N T S INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015

More information

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do ARTICLE Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do By Gene Griggs and Saad Gul This article analyzes cybersecurity issues for retirement plans. Introduction

More information

Client Risk Solutions Going beyond insurance. Risk solutions for the Healthcare sector. Start

Client Risk Solutions Going beyond insurance. Risk solutions for the Healthcare sector. Start Client Risk Solutions Going beyond insurance Risk solutions for the Healthcare sector Start Partnering to Reduce Risk Healthcare and life sciences companies face a wide array of risk challenges, stemming

More information

Second Quarter Fiscal 2018 Investor Presentation

Second Quarter Fiscal 2018 Investor Presentation Second Quarter Fiscal 2018 Investor Presentation Disclaimers Non-GAAP Financial Measures The presentation presents information about the Company s non-gaap revenue, non-gaap gross margin, non-gaap operating

More information

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group SPECIAL GUEST JAMES GRAY Underwriter, London UK Specialty Treaty Beazley Group All 6 Beazley Lloyd's Syndicates are rated A (Excellent) by A.M. Best Admitted Carrier in the US Beazley Ins Co rated A (Excellent)

More information

Solving Cyber Risk. Security Metrics and Insurance. Jason Christopher March 2017

Solving Cyber Risk. Security Metrics and Insurance. Jason Christopher March 2017 Solving Cyber Risk Security Metrics and Insurance Jason Christopher March 2017 How We Try to Address Cyber Risk What is Cyber Risk? Definitions Who should be concerned? Key categories of cyber risk Cyber

More information

Operational Risk Management

Operational Risk Management Operational Risk Management An Iceberg but Icebergs can melt DMF Stakeholders Forum Berlin, May 2013 Mike Williams mike.williams@mj-w.net Operational risk is: The risk of loss (financial or nonfinancial)

More information

Privacy and Data Breach Protection Modular application form

Privacy and Data Breach Protection Modular application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

GLOBAL FINTECH HACKCELERATOR

GLOBAL FINTECH HACKCELERATOR GLOBAL FINTECH HACKCELERATOR Industry Problem Statements Version 2018.05.21 Organised by In partnership with In collaboration with Global FinTech Hackcelerator Powered by 80 Problem statements The global

More information

Innovation and the Future of Tax

Innovation and the Future of Tax Innovation and the Future of Tax Exploring new directions in the world of tax 2018 Financial Services Tax Conference July 19, 2018 kpmg.com Notices The following information is not intended to be written

More information

CARE EXPERTISE THAT WORKS FOR YOU

CARE EXPERTISE THAT WORKS FOR YOU CARE EXPERTISE THAT WORKS FOR YOU INTRODUCING CARE FROM RSA At RSA, we know the growing Health, Care and Social sector is made up of a variety of businesses providing diverse services to meet a broad range

More information

A FRAMEWORK FOR MANAGING CYBER RISK APRIL 2015

A FRAMEWORK FOR MANAGING CYBER RISK APRIL 2015 APRIL 2015 CYBER RISK IS HERE TO STAY Even an unlimited budget for information security will not eliminate your cyber risk. Tom Reagan Marsh Cyber Practice Leader 2 SIMPLIFIED CYBER RISK MANAGEMENT FRAMEWORK

More information

Client Risk Solutions Going beyond insurance. Risk solutions for Construction. Start

Client Risk Solutions Going beyond insurance. Risk solutions for Construction. Start Client Risk Solutions Going beyond insurance Risk solutions for Construction Start Partnering to Reduce Risk AIG s Client Risk Solutions (CRS) team builds long-term relationships with organizations to

More information

How we manage risk. Risk philosophy. Risk policy. Risk framework

How we manage risk. Risk philosophy. Risk policy. Risk framework How we manage risk Risk management is integral to the daily operations of our businesses. As a multinational group with activities in over 130 countries, Naspers is exposed to a wide range of risks that

More information

Driving Profitable Growth

Driving Profitable Growth Driving Profitable Growth Frank Calderoni EVP and Chief Financial Officer December 7, 2012 Forward-Looking Statements This presentation contains projections and other forward-looking statements regarding

More information

Cyber, Data Risk and Media Insurance Application form

Cyber, Data Risk and Media Insurance Application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

Cyber-risk and cyber-controls:

Cyber-risk and cyber-controls: Cyber-risk and cyber-controls: 1 Insurance alone is not enough Cyber-risk has become one of the most significant topics in boardrooms around the world. The threat is indeed, very real. Consequently, in

More information

The Guide to Budgeting for Insider Threat Management

The Guide to Budgeting for Insider Threat Management The Guide to Budgeting for Insider Threat Management The Guide to Budgeting for Insider Threat Management This guide is intended to help show you how to approach including Insider Threat Management within

More information

CYBERINSURANCE TRENDS AND DEVELOPMENTS

CYBERINSURANCE TRENDS AND DEVELOPMENTS CYBERINSURANCE TRENDS AND DEVELOPMENTS What cyber risks can be covered Emerging products Recent cases, pending legislation and regulation Claims case studies INTRODUCTION TO CYBERINSURANCE Gartner defines

More information

Cyber Liability: New Exposures

Cyber Liability: New Exposures Cyber Liability: New Exposures Presented by: CONRAD INSURANCE 2007, 2010-2011, 2013-2014 Zywave Inc. All rights reserved. New Economy, New Exposures Business shift: Bricks and Mortar to Clicks and Orders

More information

Beazley Financial Institutions

Beazley Financial Institutions Market leading protection tailored for financial institutions, providing seamless cover from crime and professional indemnity to directors & officers and data breach. 0 1 0 0 1 1 0 0 0 1 1 0 Beazley Financial

More information

2017 MARKET REVIEW AND FORECAST

2017 MARKET REVIEW AND FORECAST 2017 MARKET REVIEW AND FORECAST SAFEGUARDING YOUR SUCCESS Executive Summary If 2016 taught us anything, the lesson would be not to rely on data for which there is no method of accounting. Put another way:

More information

SESSIONS MASTERCLASS A - 29/01/2018. Healthcare Insurance Forum

SESSIONS MASTERCLASS A - 29/01/2018. Healthcare Insurance Forum MASTERCLASS A - 29/01/2018 Building a Winning Digital Strategy for your Organisation 08:00-12:00 The world is increasingly connected through technology changing the way people think and the way business

More information

Summary of Form Changes e-md /MEDEFENSE Plus Insurance Policy (from version P1818CE-0115 to P1818CE-0716)

Summary of Form Changes e-md /MEDEFENSE Plus Insurance Policy (from version P1818CE-0115 to P1818CE-0716) GENERAL CHANGES 1. Notice Provisions Summary of Form Changes e-md /MEDEFENSE Plus Insurance Policy (from version P1818CE-0115 to P1818CE-0716) a. Currently, the policy requires notice to the Underwriters

More information

Trends in Cyber-Insurance Coverage to Meet Insureds Needs

Trends in Cyber-Insurance Coverage to Meet Insureds Needs Trends in Cyber-Insurance Coverage to Meet Insureds Needs Linda Wendell Hsu Selman Breitman LLP 33 New Montgomery Street, Sixth Floor San Francisco, CA 94105 (415) 979-0400 lhsu@selmanlaw.com William A.

More information

2017 Cyber Security and Data Privacy Study

2017 Cyber Security and Data Privacy Study RESEARCH REPORT DECEMBER 2017 2017 Cyber Security and Data Privacy Study How does your company compare? TABLE OF CONTENTS 05 How does your company compare? 06 Key findings 08 Cyber security and data privacy

More information

Digital evolution transforms the insurance. Christof Mascher KBW London / 3 March 2016

Digital evolution transforms the insurance. Christof Mascher KBW London / 3 March 2016 Digital evolution transforms the insurance Christof Mascher KBW London / 3 March 2016 The digital business model: Enhanced capabilities at the customer interface and along the entire value chain Identified

More information

Emerging issues of data ownership, interoperability, (re)usability and access to data, and liability

Emerging issues of data ownership, interoperability, (re)usability and access to data, and liability Emerging issues of data ownership, interoperability, (re)usability and access to data, and liability Liability in the area of autonomous systems and advanced robots / IoT-systems' 13 July 2017 hans.graux@timelex.eu

More information

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP CYBER LIABILITY INSURANCE OVERVIEW FOR Prepared by: Evan Taylor NFP Targeted Industries Business Sector Financial Services 10% Non-Profit 11% Retail 10% Other 37% Other 18% Type of Data PII 40% Professional

More information

1st Capacity Building Seminar on Enterprise Risk Management

1st Capacity Building Seminar on Enterprise Risk Management 1st Capacity Building Seminar on Enterprise Risk Management Hotel Sea Princess, Mumbai 10 th August 2018 ERM as a Business Enabler N K V Roop Kumar, EVP, Chief of Risk, Info & Cyber Security Management,

More information

EMERGING INSURANCE RISKS. Presented by Lawrence Njore Apex Reinsurance Brokers- Nairobi- Kenya

EMERGING INSURANCE RISKS. Presented by Lawrence Njore Apex Reinsurance Brokers- Nairobi- Kenya EMERGING INSURANCE RISKS Presented by Lawrence Njore Apex Reinsurance Brokers- Nairobi- Kenya EMERGING RISK DEFINITIONS Lloyds: An issue that is perceived to be potentially significant but which may not

More information

Cyber Risks & Cyber Insurance

Cyber Risks & Cyber Insurance Cyber Risks & Cyber Insurance Terry Quested Executive Director Associated Risk Managers of Ohio Darren Faye Vice President Leonard Insurance / Assured Partners Legal Disclaimer The views, information and

More information

Better-working insurance: moving blockchain from concept to reality

Better-working insurance: moving blockchain from concept to reality Better-working insurance: moving blockchain from concept to reality Imagine a different kind of insurance industry, one where all parties in the insurance value chain have the same risk data at the same

More information

Commercial Insurance >

Commercial Insurance > Commercial Insurance AIG Commercial Insurance combines one of the world s farthest reaching property casualty networks with our diversified, multichannel distribution network to offer our customers a broad

More information

Occupational Health and Safety (OHS) Incident Management: The Role of Business Continuity

Occupational Health and Safety (OHS) Incident Management: The Role of Business Continuity Occupational Health and Safety (OHS) Incident Management: The Role of Business Continuity Michael Torrance, Senior Associate, Occupational Health, Safety and Security 21 March 2013 Introduction Topics

More information

Cyber Risk Quantification: Translating technical risks into business terms

Cyber Risk Quantification: Translating technical risks into business terms Cyber Risk Quantification: Translating technical risks into business terms Jesper Sachmann RSA Denmark 13-06-2018 1 CYBER RISK QUANTIFICATION: TRANSLATING TECHNICAL RISKS INTO BUSINESS TERMS Jesper Sachmann

More information