Cyber Risks A Reinsurer s Perspective on Exposure & Claims. EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier
|
|
- Joseph Martin
- 5 years ago
- Views:
Transcription
1 Cyber Risks A Reinsurer s Perspective on Exposure & Claims EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier
2 Cyber: a claims sprint through the last year (and a bit ) Source: wikipedia.org Source: bleepingcomputer.com Source: Wikipedia.org Source: flyertalk.com Source: businessinsider.com Source: Google.com 2
3 Cyber coverage: trends & challenges 3
4 Cyber coverage landscape Affirmative cyber covers Third party covers Data Privacy Liability First party covers Business Interruption (BI) and Contingent Business Interruption (CBI) Regulatory Defence Data Restoration Communication and Media Liability Network and Information Security Liability Incident Response Costs (might include Notification, Forensics, PR, Monitoring) Cyber Extortion 4
5 Underlying coverage trends System failure coverage (named vs. open perils) Contingent business interruption Cyber creep in GTPL (and other) policies Bodily injury / property damage extensions in cyber policies Lack of standardized wordings Critical infrastructure War Confiscation / seizure 5
6 Traditional treaty reinsurance structures applied to cyber (1/2) Alignment of interests Solvency relief Expenses funding Quota share No protection against large losses Large loss protection Risk XL Accumulation of retentions in case of event hitting multiple insureds 6
7 Traditional treaty reinsurance structures applied to cyber (2/2) Earnings protection Capital relief Aggregate XL Stop loss Lack of alignment of interests Cost One retention in case of large event Event XL Difficulty in defining event Complexity of a line of business that has multiple triggers 7
8 As always, the devil is in the wording Some reinsurance wordings include loose event definitions When determining what shall be considered a single event, the Reinsured may include a single act or a series of related acts, and may consider objective factors including when and where such act(s) are executed, whether they are performed by the same perpetrator, whether they use the same technique or malware, and if they target insureds operating in the same industry segment. Current geopolitical climate is driving a push from brokers to weaken war exclusions War, per the Reinsured's policies. However, this shall not apply to: a. Loss or damage arising out of or caused by an act of terrorism as defined in the Definitions Article; or b. Loss or damage occasioned by riots, strikes, civil commotion, vandalism, malicious damage, including acts committed by agents of any government, party or faction engaged in war, hostilities or other warlike operation, provided such agents are acting secretly and not in connection with any operations of military or naval armed forces in the country where the interests insured are situated. 8
9 Quantifying cyber risks & accumulation 9
10 The traditional actuarial approach Source: Swiss Re Economic Research & Consulting 10
11 The challenges in applying traditional methods to cyber risks Lack of empirical data Lack of historical data Lack common reporting standards for data breaches Lack of understanding of rare & severe risks Fluidity of risk drivers New actors & new attack methods The human element Accumulation potential IT monoculture Cloud services Correlated vulnerabilities 11
12 Cyber accumulation main scenario clusters DDoS / IO (Distributed Denial of Service / Interruption of Operations) Coordinated attack that affects many e-sales portals Attack on clouds Widespread internet outage Data Breach (Impact on personal data) Personal data and credit card data are stolen from several data banks using the same systems Critical Infrastructure (With or without property damage) A virus is blocking the cooling system of several generators that sub sequentially start to burn Malware affecting a transmissions operator leads to a blackout (without property damage) 12
13 Silent cyber 13
14 Silent cyber exposure matters because it constitutes a real risk it s getting on regulators agenda Traditional property insurance policies are expected to cover physical damage and business interruption from incidents like the cyber attack to a German steel mill in 2014 By its nature, silent cyber risk is not always identified, managed and monitored and may be a material risk for firms The PRA expects firms to robustly assess and actively manage their insurance products with specific consideration to silent cyber risk exposure Source: PRA consultation paper CP 39/16 14
15 Unless explicitly excluded, cyber risks might be covered by most conventional insurance policies Extent of cyber risk coverage Affirmative/ explicit Non- affirmative/ silent Partially excluded (e.g. NMA 2914) Fully excluded (e.g. CL 380) Silent cyber exposure: Depending on the scope of insuring agreements, losses caused by cyber perils might be silently covered in most conventional insurance policies Engineering Property General Liability Silent cyber can creep into policies where cyber exclusions are not fully exhaustive Trend towards digitization and new technologies such as IoT, smart homes, autonomous cars are likely to increase silent cyber exposure under conventional lines Marine Silent cyber in E&O Underwriters should carefully assess how silent cyber exposure might impact loss severity and frequency Understanding silent cyber exposures in conventional lines is key to actively manage accumulation Other LoBs Motor D&O 15
16 The limits of insurability 16
17 A world of many threats Our adversaries are becoming more adept at using cyberspace to threaten our interests and advance their own, and despite improving cyber defenses, nearly all information, communication networks, and systems will be at risk for years. Daniel R. Coats, Director of National Intelligence Senate Select Committee on Intelligence, May 2017 What I see frightens me. I am frightened because our enemies are no longer known to us. They do not exist on a map. They are not nations, they are individuals. And look around you. Who do you fear? Can you see a face, a uniform, a flag? Our world is not more transparent now. It is more opaque. It is in the shadows. M, Skyfall 17
18 Criminal acts, terrorism, war: a blurred line Losses arising out of malicious acts committed against an insured Losses arising out of criminal / wilful acts committed by an insured Losses resulting from act of cyber terrorism Losses resulting from act of war 18
19 A few thoughts for the future Role of governments Role of pools Role of financial markets 19
20 20
21 Legal notice 2018 Swiss Re. All rights reserved. You are not permitted to create any modifications or derivative works of this presentation or to use it for commercial or other public purposes without the prior written permission of Swiss Re. The information and opinions contained in the presentation are provided as at the date of the presentation and are subject to change without notice. Although the information used was taken from reliable sources, Swiss Re does not accept any responsibility for the accuracy or comprehensiveness of the details given. All liability for the accuracy and completeness thereof or for any damage or loss resulting from the use of the information contained in this presentation is expressly excluded. Under no circumstances shall Swiss Re or its Group companies be liable for any financial or consequential loss relating to this presentation. 21
Cyber a risk on the rise. Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist
Cyber a risk on the rise Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist Cyber data breaches reaching a new level 1 000 000 000 Source: http://money.cnn.com/2016/09/22/technology/yahoo-data-breach/
More informationSolving Cyber Risk. Security Metrics and Insurance. Jason Christopher March 2017
Solving Cyber Risk Security Metrics and Insurance Jason Christopher March 2017 How We Try to Address Cyber Risk What is Cyber Risk? Definitions Who should be concerned? Key categories of cyber risk Cyber
More informationAn Overview of Cyber Insurance at AIG
An Overview of Cyber Insurance at AIG Michael Lee, MBA Cyber Business Development Manager AIG 2018 Brittney Mishler, ARM Cyber Casualty Underwriting Specialist AIG Cyber Insurance It s a peril, not a product
More informationTerrorism, Zika, CBI - Business Operations Impacted Without Physical Damage? Now What?
Terrorism, Zika, CBI - Business Operations Impacted Without Physical Damage? Now What? Introduction - Presenters Todd Cheema Senior Vice President Senior Structurer Innovative Risk Solutions Swiss Re Direct:
More informationNon-physical Damage Business Interruption (NDBI) Innovative Earnings Protection
Non-physical Damage Business Interruption (NDBI) Innovative Earnings Protection Agenda Introductions It s a Dangerous World A Framework for Evaluating Corporate Risks Limitations of Traditional Insurance
More informationCYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner
CYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner CYBER EXPOSURE IN IF TOPICS Brief overview of If s Liability portfolio Cyber today s definition Cyber coverages
More informationThe Internet of Everything: Building Cyber Resilience in a Connected World
The Internet of Everything: Building Cyber Resilience in a Connected World The Internet of Things (IoT) is everywhere, ushering in a technological revolution at lightning speed. According to an Oliver
More informationCyber & Privacy Liability and Technology E&0
Cyber & Privacy Liability and Technology E&0 Risks and Coverage Geoff Kinsella Partner http://map.norsecorp.com http://www.youtube.com/watch?v=f7pyhn9ic9i Presentation Overview 1. The Cyber Evolution 2.
More informationYou ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017
You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business
More informationCYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY. October Sponsored by:
CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY October 2014 CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY Global reinsurer PartnerRe collaborated with Advisen to conduct a comprehensive market survey
More informationCybersecurity and the Law Seminar
Cybersecurity and the Law Seminar A practical walk-through of the legal landscape, enforcement, management liability and discussions on potential real-world situations Zurich 25 September 2018 What can
More informationNAIC BLANKS (E) WORKING GROUP
NAIC BLANKS (E) WORKING GROUP Blanks Agenda Item Submission Form DATE: 0//0 CONTACT PERSON: Sara Robben TELEPHONE: 8-8-80 EMAIL ADDRESS: srobben@naic.org ON BEHALF OF: NAME: Commissioner Mike Chaney FOR
More informationAt the Heart of Cyber Risk Mitigation
At the Heart of Cyber Risk Mitigation De-risking Cyber Threats with Insurance Vikram Singh Abstract Management of risks is an integral part of the insurance industry. Companies have succeeded in identifying
More informationCyber Risk & Insurance
Cyber Risk & Insurance Digitalization in Insurance a Threat or an Opportunity Beirut, 3 & 4 May 2017 Alexander Blom - AIG 1 Today s Cyber Presentation Cyber risks insights from an insurance perspective
More informationTerrorism Risk and Insurance Markets in 2012
Terrorism Risk and Insurance Markets in 2012 OECD Headquarters, Paris, France December 2012 1. Risk management process 2. Identification, assessment and risk mitigation 3. Financing: Self-Insurance Insurance
More informationTerrorism (re-)insurance market trends - a global perspective
Terrorism (re-)insurance market trends - a global perspective OECD Meeting «Terrorism Reinsurance» Peter Buetikofer, Swiss Re Property Centre Reinsurance Terrorism (re-)insurance What has changed since
More informationTerrorism and Cyber the fast changing landscape it is not just about privacy anymore
Terrorism and Cyber the fast changing landscape it is not just about privacy anymore www.miller-insurance.com Terrorism - conventional exposures and responses Miller Insurance Services LLP is authorised
More informationS L tr lo a y t d egy s Cyber -Attack
Lloyd s Cyber-Attack Strategy 02 Introduction The focus of this paper is on insurance losses arising from malicious electronic acts, referred to throughout as cyber-attack. The malicious act is the proximate
More informationHOW TO INSURE CYBER RISKS? Oulu Industry Summit
HOW TO INSURE CYBER RISKS? Oulu Industry Summit 2017 6.10.2017 Panu Peltomäki Liability and Financial Lines Practice Leader Marsh Oy Marsh A Leader in Quality, Scope, and Scale GLOBAL RISKS OF CONCERN
More informationChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them
ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them PROVIDED BY HUB INTERNATIONAL October 25th, 2016 W W W. C H I C A G O L A N D R I S K F O R U M. O R G AGENDA 1. The evolution of
More informationInstitute of Actuaries of India
Institute of Actuaries of India Subject ST7 General Insurance: Reserving & Capital Modeling September 2016 Examination INDICATIVE SOLUTION Solution 1: Restrictions on the type of business e.g. Classes
More informationDECLARATIONS. Limits of Liability in respect of each Occurrence and in the aggregate: Underlying Amount(s) or Each Occurrence Retention:
DECLARATIONS Item 1. Name and Address of the Named Insured: Item 2. Limits of Liability in respect of each Occurrence and in the aggregate: Item 3. Underlying Amount(s) or Each Occurrence Retention: Item
More informationYour defence toolkit. How to combat the cyber threat
Your defence toolkit How to combat the cyber threat Contents The threat of cyber crime 4 How UK businesses are targeted 6 Case studies 8 Why cyber security is so important to manufacturers now 10 The
More informationChubb Cyber Enterprise Risk Management
Chubb Cyber Enterprise Risk Management Fact Sheet Financial Lines Chubb Cyber Enterprise Risk Management When it comes to a data security breach or privacy loss, it isn t a matter of if it will happen
More informationCybersecurity Insurance: The Catalyst We've Been Waiting For
SESSION ID: CRWD-W16 Cybersecurity Insurance: The Catalyst We've Been Waiting For Mark Weatherford Chief Cybersecurity Strategist varmour @marktw Agenda Insurance challenges in the market today 10 reasons
More informationCybersecurity Insurance: New Risks and New Challenges
SESSION ID: SDS1-F01 Cybersecurity Insurance: New Risks and New Challenges Mark Weatherford Chief Cybersecurity Strategist varmour @marktw The cybersecurity market in the Asia Pacific region contributes
More informationNHC Cyber Insurance, Service and Incident Response. 19. oktober 2017
NHC Cyber Insurance, Service and Incident Response 19. oktober 2017 Why is cyber an insurance concern? Unknown potential for aggregation Could one single event impact two, ten, fifty, hundred vessels?
More informationNon-physical BI a new business opportunity???
Non-physical BI a new business opportunity??? Tourism Industry in Croatia A fast growing factor 20.000.000 Total tourist arrivals 15.000.000 10.000.000 5.000.000 0 2013 2014 2015 2016 2017 2.500.000 2.000.000
More informationA GUIDE TO CYBER RISKS COVER
A GUIDE TO CYBER RISKS COVER Cyber risk the daily business threat to SMEs Cyber risks and data security breaches are a daily threat to everyday business. Less than 10% of UK companies have cyber insurance
More informationPolicy Statement PS15/17 Cyber insurance underwriting risk. July 2017
Policy Statement PS15/17 Cyber insurance underwriting risk July 2017 Prudential Regulation Authority 20 Moorgate London EC2R 6DA Policy Statement PS15/17 Cyber insurance underwriting risk July 2017 Contents
More informationA FRAMEWORK FOR MANAGING CYBER RISK APRIL 2015
APRIL 2015 CYBER RISK IS HERE TO STAY Even an unlimited budget for information security will not eliminate your cyber risk. Tom Reagan Marsh Cyber Practice Leader 2 SIMPLIFIED CYBER RISK MANAGEMENT FRAMEWORK
More informationNZI LIABILITY CYBER. Are you protected?
NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is
More informationFM Global. First-Party Property Cyber Coverage
First-Party Property Cyber Coverage Introduction Cyber is Board of Directors level concern #1 issue for commercial insurance industry Everyone on steep learning curve Objective and Agenda Understand differences
More informationProduct liability and related coverage through insurance
Allianz Global Corporate & Specialty SE CLEPA Warranty Conference 2015 Product liability and related coverage through insurance Christof Bentele Chief Underwriting Office Corporate / Liability Brussels,
More informationHEALTHCARE INDUSTRY SESSION CYBER IND 011
HEALTHCARE INDUSTRY SESSION CYBER IND 011 Speakers: Jody Westby, Chief Executive Officer, Global Cyber Risk René Siemens, Partner, Covington & Burling LLP Brent Rieth, Senior Vice President and Team Leader,
More informationCyber Risks & Cyber Insurance
Cyber Risks & Cyber Insurance Terry Quested Executive Director Associated Risk Managers of Ohio Darren Faye Vice President Leonard Insurance / Assured Partners Legal Disclaimer The views, information and
More informationDATA COMPROMISE COVERAGE FORM
DATA COMPROMISE DATA COMPROMISE COVERAGE FORM Various provisions in this policy restrict coverage. Read the entire policy carefully to determine rights, duties and what is and is not covered. Throughout
More informationUnderwriting priorities. Edi Schmid, Group Chief Underwriting Officer
Underwriting priorities Edi Schmid, Group Chief Underwriting Officer Competitive advantage achieved through underwriting priorities Underwriting priorities Competitive advantage Target liability portfolio
More informationAon Risk Solutions. Global Broking Centre ALPHA AON S GLOBAL TERRORISM & POLITICAL VIOLENCE SOLUTION INTERNATIONAL
Aon Risk Solutions Global Broking Centre ALPHA AON S GLOBAL TERRORISM & POLITICAL VIOLENCE SOLUTION INTERNATIONAL The evolving terrorism environment In the wake of a sharp rise in terrorist attacks during
More informationCyber Risks & Insurance
Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of
More informationCyber Liability A New Must Have Coverage for Your Soccer Organization
Cyber Liability A New Must Have Coverage for Your Soccer Organization Presented By: Pat Pullen Jeanne Zabuska President Underwriting Manager February 17, 2012 Why do you need Cyber Liability? Have a web
More informationCyber Risk Management
Cyber Risk Management Privacy & Data Protection Agenda 2 Introductions Risk Management 101 Defining & Quantifying a Breach Prevention, Mitigation & Transfer Strategies Finance Strategy- Cyber Insurance
More informationThe Continuous Evolution of the. Implications (Session Code CRM11/690)
The Continuous Evolution of the Internet of Things and Insurance Implications (Session Code CRM11/690) Speakers: Denise C. Schlitt, Director, Global Risk Management NCR Corporation Fredrik Motzfeldt -
More informationIMO PROVISION OF FINANCIAL SECURITY
INTERNATIONAL MARITIME ORGANIZATION E IMO LEGAL COMMITTEE 92nd session Agenda item 5 LEG 92/5/3 15 September 2006 Original: ENGLISH PROVISION OF FINANCIAL SECURITY (ii) Follow-up on resolutions adopted
More informationMeeting the Challenges of Change
Natural Catastrophes - Lessons for the Indian Market from 2011 Global Experience Jyoti Majumdar Vice President, Head Cat Perils Asia Hub Swiss Reinsurance Company, Bangalore Meeting the Challenges of Change
More informationThe working roundtable was conducted through two interdisciplinary panel sessions:
As advancements in technology enhance productivity, develop new businesses and enhance economic growth, malicious actors continue to advance as well, seeking to exploit technology for any number of criminal
More informationCyber Risks - Engineering Insurers Perspective
Quelle: Verwendung unter Lizenz von Shutterstock.com Cyber Risks - Engineering Insurers Perspective MIA Working Group Paper 98 (16) IMIA Annual Conference 2016 - Doha, Qatar October 4, 2016 Alexander Schmidl
More informationCyber insurance: Growing pains. 9 February 2017 Transforming healthcare Michael Schmitt
Cyber insurance: Growing pains 9 February 2017 Transforming healthcare Michael Schmitt Cyber Incidents Headlines Target Corporation (2013) 110 Million records compromised $240 million cost of reissuing
More informationTerrorism Section. Definitions applicable to this Section
Terrorism Section Definitions applicable to this Section Consequential loss means loss resulting from interruption of or interference with your business carried on by you at the premises in consequence
More informationTerms and Conditions Cyber Enterprise Risk Management Insurance
Terms and Conditions Cyber Enterprise Risk Management Insurance Cyber Enterprise Risk Management Insurance Relationship of the Insurer, the Policyholder and the Insured in connection with Cyber Enterprise
More informationOECD PROJECT ON CYBER RISK INSURANCE
OECD PROJECT ON CYBER RISK INSURANCE April 2016 Introduction 1. Cyber risks pose a real threat to society and the economy, the recognition of which has been given increasingly wide media coverage in recent
More informationLarge bodily injury claims in Europe. Swiss Re Nordics Motor Roundtable, August 2018, Anita Wackerl
Large bodily injury claims in Europe Swiss Re Nordics Motor Roundtable, August 2018, Anita Wackerl 2 Trends in Motor Insurance Claims Managements Cross Border Claims Jurisdiction Bodily Injury claims Large
More informationOECD Expert Workshop, May 13, Cyber Risk and Cyber Risk Insurance: What do we know? What can we measure? Martin Eling
OECD Expert Workshop, May 13, 2017 Cyber Risk and Cyber Risk Insurance: What do we know? What can we measure? Martin Eling Management Summary Research Approach: Overview of the main research topics in
More informationCyber Liability Launch Event Moscow
Allianz Global Corporate & Specialty Cyber Liability Launch Event Moscow AGCS November 2016 Cyber Insurance market Stand Alone Business USA USA Started in the early to mid 1990 s 50 Started + carriers
More informationCYBER AND INFORMATION SECURITY COVERAGE APPLICATION
NOTICE: THIS APPLICATION IS FOR CLAIMS-MADE AND REPORTED COVERAGE, WHICH APPLIES ONLY TO CLAIMS FIRST MADE AND REPORTED IN WRITING DURING THE POLICY PERIOD, OR ANY EXTENDED REPORTING PERIOD. THE LIMIT
More informationThe Changing World for Commercial Landlords In Post September 11 th America Lease Waivers
The Changing World for Commercial Landlords In Post September 11 th America Lease Waivers Harris Ominsky Blank Rome Comisky & McCauley LLP Philadelphia, Pennsylvania TRADITIONAL PROPERTY INSURANCE EXCLUSIONS
More informationPRIVACY AND CYBER SECURITY
PRIVACY AND CYBER SECURITY Presented by: Joe Marra, Senior Account Executive/Producer Stoya Corcoran, Assistant Vice President Presented to: CIFFA Members September 20, 2017 1 Disclaimer The information
More informationRIMS Cyber Presentation
RIMS Cyber Presentation Forrest Pace Cyber & Strategic Risk Leader South Zone AIG Property Casualty Forrest.Pace@aig.com 1 Bio Forrest Pace is the Cyber and Strategic Risk Leader for the South Zone, coordinating
More informationProduct Innovation. Crisis Management. Aon London Global BrokingCentre
Product Innovation Crisis Management Aon London Global BrokingCentre The nature and complexity of Terrorism continues to evolve, and as a consequence, the London Market has developed an array of specialist
More informationSpecialty Risk Protector. Network Interruption Insurance ( NETWORK INTERRUPTION COVERAGE SECTION )
Specialty Risk Protector Network Interruption Insurance ( NETWORK INTERRUPTION COVERAGE SECTION ) THIS IS AN OCCURRENCE COVERAGE SECTION AND A FIRST PARTY COVERAGE SECTION Notice: Pursuant to Clause 1
More informationWhen The Wind Blows: Renewable Energy Risk Management Strategies
When The Wind Blows: Renewable Energy Risk Management Strategies Small Wind Conference 2017 1 Overview About HUB Insurance Solutions General Coverage Overview Stakeholders Cyber Liability Engineers and
More informationTERRORISM INSURANCE. PD Wording T3 (Amended) Insuring Clause
TERRORISM INSURANCE PD Wording T3 (Amended) Insuring Clause Subject to the exclusions, limits and conditions hereinafter contained, this Insurance insures buildings and contents against physical loss or
More informationCyber-Insurance: Fraud, Waste or Abuse?
SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major
More informationCYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP
CYBER LIABILITY INSURANCE OVERVIEW FOR Prepared by: Evan Taylor NFP Targeted Industries Business Sector Financial Services 10% Non-Profit 11% Retail 10% Other 37% Other 18% Type of Data PII 40% Professional
More informationCYBER REPORT CYBER REPORT 2018
2018 CYBER REPORT CYBER REPORT 2018 Table of Contents 1. Introduction 2 2. Technology Risk Resiliency 3 3. Cyber Underwriting 5 4. Key Statistics 6 5. Cyber Stress Scenarios 7 1. Introduction Technology
More informationVehicles as weapons: Impact on MTPL insurance in selected European Countries
Vehicles as weapons: Impact on MTPL insurance in selected European Countries EMEA Claims Conference 2018, Rüschlikon, 6th - 7th March 2018, Andreas Hohl The factual starting position 2 The potential a
More informationSummary of Form Changes e-md /MEDEFENSE Plus Insurance Policy (from version P1818CE-0115 to P1818CE-0716)
GENERAL CHANGES 1. Notice Provisions Summary of Form Changes e-md /MEDEFENSE Plus Insurance Policy (from version P1818CE-0115 to P1818CE-0716) a. Currently, the policy requires notice to the Underwriters
More informationThe Arab Spring. Outline
The Arab Spring ts impact on the olitical isk nsurance Market Andrew Tobin Andrew.tobin@clydeco.com ; 020 7876 4449 Outline Evolution of olitical Violence olicies ( V olicies ) The products: Coverage and
More informationSpecialty Risk Protector. Security and Privacy Liability Insurance ( SECURITY AND PRIVACY COVERAGE SECTION )
Specialty Risk Protector Security and Privacy Liability Insurance ( SECURITY AND PRIVACY COVERAGE SECTION ) THIS IS A CLAIMS MADE AND REPORTED COVERAGE SECTION AND A THIRD PARTY COVERAGE SECTION Notice:
More informationDEBUNKING MYTHS FOR CYBER INSURANCE
SESSION ID: GRC-F02 DEBUNKING MYTHS FOR CYBER INSURANCE Robert Jones Global Head of Financial Lines Specialty Claims AIG Garin Pace Cyber Product Leader AIG @Garin_Pace Introduction What Is Cyber Insurance?
More informationAdd our expertise to yours Protection from the consequences of cyber risks
CyberEdge THIS INFORMATION IS INTENDED FOR INSURANCE BROKERS AND OTHER INSURANCE PROFESSIONALS ONLY Add our expertise to yours Protection from the consequences of cyber risks What is CyberEdge? 2 CyberEdge
More informationSolvency II Standard Formula: Consideration of non-life reinsurance
Solvency II Standard Formula: Consideration of non-life reinsurance Under Solvency II, insurers have a choice of which methods they use to assess risk and capital. While some insurers will opt for the
More informationSupporting digital risk management - CRO Forum work on digital incident categorisation
General Public Release Supporting digital risk management - CRO Forum work on digital incident categorisation OECD Expert Group meeting 12/13 May 2017 Nick Kitching, CRO Swiss Re Europe S.A. CRO Forum
More informationProperty business interruption Policy wording
Please read the schedule to see if your loss of income, loss of gross profit, increased costs of working or additional increased costs of working are covered or if a first loss limit or flexible business
More informationInsuring your online world, even when you re offline. Masterpiece Cyber Protection
Insuring your online world, even when you re offline Masterpiece Cyber Protection Protect your online information from being an open network 97% of Chubb clients who had a claim paid were highly satisfied
More informationEMERGING INSURANCE RISKS. Presented by Lawrence Njore Apex Reinsurance Brokers- Nairobi- Kenya
EMERGING INSURANCE RISKS Presented by Lawrence Njore Apex Reinsurance Brokers- Nairobi- Kenya EMERGING RISK DEFINITIONS Lloyds: An issue that is perceived to be potentially significant but which may not
More informationWarranted not to abandon in case of capture, seizure or detention, until after condemnation of the property insured.
AMERICAN INSTITUTE HULL WAR RISKS AND STRIKES CLAUSES (INCLUDING AUTOMATIC TERMINATION AND CANCELLATION PROVISIONS) FOR ATTACHMENT TO AMERICAN INSTITUTE HULL CLAUSES December 1, 1977-14.1005/US/0409 This
More informationISO Cyber Risk Solutions
ISO Cyber Risk Solutions To help address a major issue facing today s cyber insurance market the need for more detailed underwriting and rating related information ISO developed loss costs informed by
More informationLIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE
I N S U R A N C E a g a i n s t c y b e r r i s k s After "prevention", risk covering is always the next step. Good insurance policies have the substantial merit allowing people to progress, even choosing
More informationCyber Silent Exposure in Industrial Property A representative discussion for the entire industry? Simon Dejung
Cyber Silent Exposure in Industrial Property A representative discussion for the entire industry? Simon Dejung London November 16, 2016 DISCLAIMER The opinions expressed in this presentation represents
More informationRisk Mitigation and the role of (re)insurance
Risk Mitigation and the role of (re)insurance Michael Eberhardt, CFA < copyright name, company or Institute> This presentation has been prepared for the Actuaries Institute 2016 Managing Extreme Events
More informationPrivacy and Data Breach Protection Modular application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
More informationSECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD
SECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD The insured perils Criminal abduction, assault, bribery demand, competitor malfeasance, criminal facilitation, murder, product tampering, stalking,
More informationDoes it pay to be cyber-insured
Does it pay to be cyber-insured Dr. Marie Moe Research Scientist, SINTEF ICT, @MarieGMoe Mr. Eireann Leverett Founder and CEO, Concinnity Risks, @blackswanburst @concinnityrisks Key issues Where do insurance
More informationEmerging risks what will we face in the future?
Emerging risks what will we face in the future? NHOs pensjons og forsikringskonferanse, 12 November 2014 Sandra Burmeier Senior Emerging Risk Manager sandra_burmeier@swissre.com +41 43 285 9506 Emerging
More informationCyber Risk. October 2017
Cyber Risk October 2017 The Cyber Landscape Dimensions to cyber risk Who is likely to target your clients Which jurisdictions do they operate in? Threat Types What is their line of business? Geography
More informationImproving Cyber-Security Through Insurance The Past, Present, and the Future
Improving Cyber-Security Through Insurance The Past, Present, and the Future Ranjan Pal QED Research Group University of Southern California MSU Interdisciplinary Conference on Cybercrime, 2017 1 Motivating
More informationTERRORISM VERSUS POLITICAL VIOLENCE ARE YOU COVERED?
TERRORISM VERSUS POLITICAL VIOLENCE ARE YOU COVERED? TERRORISM AND WAR ARE STANDARD EXCLUSIONS FROM PROPERTY DAMAGE POLICIES. TERRORISM VERSUS POLITICAL VIOLENCE ARE YOU COVERED? Rarely does a day go by
More informationaustralia Canada ireland israel united kingdom United states Rest of world cfcunderwriting.com
australia Canada ireland israel united kingdom United states Rest of world CYBER PRIVATE ENTERPRISE policy document cfcunderwriting.com 1 PREAMBLE This Policy is a contract of insurance between you and
More informationInsurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage
Presenting a live 90-minute webinar with interactive Q&A Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage THURSDAY, OCTOBER 5, 2017 1pm Eastern 12pm Central
More informationCyber, Data Risk and Media Insurance Application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
More informationClaims Made Basis. Underwritten by Underwriters at Lloyd s, London
APPLICATION for: NetGuard Plus Claims Made Basis. Underwritten by Underwriters at Lloyd s, London tice: The Policy for which this Application is made applies only to Claims made against any of the Insureds
More informationCyber Security & Insurance Solution Karachi, Pakistan
March 2017 Cyber Security & Insurance Solution Karachi, Pakistan Ram Garg CFA, MBA Financial & Casualty Line J B Boda & Co (Singapore) Pte Ltd Karachi Insurance Institute Agenda Cyber Risk - Background
More informationGlobal Resilience Risk
Global Resilience Risk An Insurers Perspective WEC Energy Summit 16 March 2016 Jamie Summons, Head of Weather Solutions, Asia Pacific Swiss Re Weather Market Capability Global presence, market leadership
More informationCyber Risk Mitigation
Cyber Risk Mitigation Eide Bailly Howalt + McDowell Insurance Introduction Meet your presenters Eric Pulse Risk Advisory Director 20 years in the public accounting and consulting industry providing information
More informationCyber Risk some strategic issues
Cyber Risk some strategic issues Paper by Marie Dequae - member of the EIOPA Insurance and Reinsurance Stakeholder Group (IRSG) This paper was drafted as the topic has been identified by the IRSG as one
More informationThe Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage
The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage James P. Bobotek james.bobotek@pillsburylaw.com (202) 663-8930 Pillsbury Winthrop Shaw Pittman LLP DOCUMENT
More informationProperty business interruption (technology) Policy wording
Please read the schedule to see if your loss of income, loss of gross profit, increased costs of working or additional increased costs of working are covered or if a first loss limit or flexible business
More informationLiability Management for Fruit and Vegetable Producers
Liability Management for Fruit and Vegetable Producers Theodore A. Feitshans North Carolina Cooperative Extension Department of Agricultural & Resource Economics North Carolina State University Risk Management
More informationa) Employers Liability Insurance Policy Wording
a) Employers Liability Insurance Policy Wording Section 1: PREAMBLE In consideration of the payment of the premium to US, WE shall provide the cover described in the POLICY, subject to its terms and conditions,
More information