PRIVACY AND CYBER SECURITY

Size: px
Start display at page:

Download "PRIVACY AND CYBER SECURITY"

Transcription

1 PRIVACY AND CYBER SECURITY Presented by: Joe Marra, Senior Account Executive/Producer Stoya Corcoran, Assistant Vice President Presented to: CIFFA Members September 20,

2 Disclaimer The information in this session is provided for general overview purposes only and are those of the author and do not necessarily represent the views of Arthur J. Gallagher Canada Limited or any of the Arthur J. Gallagher Group of Companies. The information presented is not nor does it purport to be, a complete or exhaustive analysis of legal liability exposures, risks, coverage terms and conditions, all of which may impact coverage 2

3 AGENDA 1. About Arthur J. Gallagher Canada Limited 2. Why Chubb Insurance Company of Canada 3. Why is Cyber Liability Insurance Essential 4. Cyber Coverages 5. Limits and Indication of Premium 6. Network Security Awareness 7. Questions & Answers 3

4 Arthur J. Gallagher - Our Core Pillars Our Culture Our Expertise Client Service Carrier Relationships World s Most Ethical Company The Gallagher Way Market Leadership Regional Leadership Industry Leadership 25 offices across Canada 150 countries worldwide Benefit from our global scale 4 th largest insurance broker globally J.D. Power Award 4

5 Why Chubb Insurance? Chubb has an AM Best Rating of A++ (Superior) Chubb has been Insuring Cyber Liability Risks since 1998 and has the expertise in handling claims for this class of business Chubb operates in 54 countries, with approximately 30,000 employees serving a diverse group of clients worldwide Chubb is market-leading in customizable solutions to address clients unique needs, regardless of size, industry or type of risk 5

6 Various Types of Data That Have Been Involved in Incidents Include: Driver s license numbers First and last names Social Insurance numbers Home addresses Tax ID numbers Credit card information CVV numbers Phone numbers Diagnosis codes Dates of birth Travel information Diagnostic information addresses Debit card information Bank information Health symptoms Employee payroll information Passport number and contact information Banking information Salary information Health insurance numbers Employee ID numbers Mobile banking username and passwords Source: Chubb Insurance Company of Canada 6

7 No Matter How Good Your IT Department Is 7

8 Cyber Claims Trends as of February 2017) Source: Chubb Insurance Company of Canada 8

9 Canadian Loss Data Average cost of breach in Canada - $5.78 mm Cost to replace lost client record - $255 per record Frequency of cyber attacks increasing Costs to resolve a breach rising consistently Lack of an incident response plan led to higher corporate costs overall Losing customers is a major risk for companies who suffer a breach Average network downtime following an attack is 5 days *Source: Ponemon Institute Study on Global Data Breaches, June

10 Why Cyber Insurance? No one is immune While being cybersecurity ready can mitigate your loss, a comprehensive insurance policy can keep your business on stable financial footing Insurance protects your organization s balance sheet It will provide the financial security and the services required to handle a cyber incident 10

11 Duty of Care Directors and officers must act with good faith and in the best interest of the organization. They have a legal duty to protect the information that they are entrusted with Do Directors and Officers have an understanding of their exposure? Are they certain they are managing that risk as effectively as possible? Does the organization have the financial resources to fully recover from a cyber event? 11

12 Cyber Insurance Incident Response First-Party Third-Party Coach Services Forensics Notification Credit Monitoring Public Relations Extortion Interruption Restoration Cyber Crime Privacy Liability +Regulatory + Payment Card Network Liability Media Liability Source: Chubb Insurance Company of Canada 12

13 Incident Response Coach Services A breach coach is the first responder along with the claims/legal professional Forensics A forensic investigation is necessary to determine what occurred and how to repair the damage Notification Data breach notification is required to customers and other affected parties Credit Monitoring This is necessary to assist in detecting signs of identity theft including fraudulent credit activity Public Relations A PR consultant is required to offset reputation loss and re-establish trust of customers and other affected parties 13

14 First-Party Extortion Cyber extortion and ransomware refers to a criminal threat to release sensitive information or bring down a network Interruption The downtime including the monetary losses the company experiences during the period of recovery Restoration Costs incurred to replace, restore or recollect data which has been corrupted or destroyed as a result of a network security failure Cyber Crime Also known as Social Engineering Fraud whereby a criminal purports to be a vendor, client, executive or some other legitimate party and convinces an employee to act voluntarily to perform a task such transferring funds or part with money 14

15 Third-Party Privacy Liability Losses arising out of the company s failure to protect sensitive personal or corporate information in any format Regulatory Regulatory proceeding brought by a government agency alleging the violation of any federal or provincial privacy legislation Payment Card Companies that are processors of major credit cards such as Visa, MasterCard or American Express are obliged to be PCI-DSS compliant Network Liability Losses arising out of the company s liability arising out of the failure of a network security impacting others Media Liability Coverage for infringement of copyright/trademark, invasion of privacy, libel, slander, plagiarism by the company from content on it s website 15

16 Limits and Indication of Premium Gross Revenue Limit Retention Sub-Limits Premium 0 - $2,000,000 $1,000,000 $2,500-$5,000 $250,000 Payment Card $2,100-$2,350 $10,000(Soc. Eng.) $ 50,000 Social Eng. $2,000,000 to $1,000,000 $2,500-$5,000 $250,000 Payment Card $2,990-$3,110 $3,000,000 $15,000(Soc. Eng.) $ 50,000 Social Eng. $3,000,000 to $1,000,000 $2,500-$5,000 $250,000 Payment Card $3,480-$4,110 $5,000,000 $15,000(Soc. Eng.) $ 50,000 Social Eng. 16

17 Chubb Cyber Services Chubb believes that being ready to respond will limit the losses when a cyber incident occurs. Therefore, it is important to complement superior protection by offering enhanced benefits for policyholders to address cyber exposures (pre-event) and recover from cyber events (post-event) 17

18 Chubb Cyber Services Loss Mitigation Services help limit cyber exposures before a loss occurs Password Defense Secure password manager app to help create and use stronger passwords across the web Online Cyber Education Two online courses available to all employees to help improve individual cyber awareness Signature Assessments Five unique assessment services to help quickly gauge and mitigate key exposures Incident Response Plan Protected Data Access Phishing Awareness Network Vulnerability Scan Security Monitoring Source: Chubb Insurance Company of Canada 18

19 Chubb Cyber Services Partner Network - help address ongoing cyber security Solutions to help protect and monitor your endpoints against malware Solutions to help protect against insider threats and ransomware Solutions to help encrypt important information stored both internally and externally Solutions to help maintain healthy enterprise security operations Solutions to help assess and maintain compliance with PCI and other requirements Source: Chubb Insurance Company of Canada 19

20 CONCLUSION QUESTIONS & ANSWERS THANK YOU 20

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group SPECIAL GUEST JAMES GRAY Underwriter, London UK Specialty Treaty Beazley Group All 6 Beazley Lloyd's Syndicates are rated A (Excellent) by A.M. Best Admitted Carrier in the US Beazley Ins Co rated A (Excellent)

More information

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP CYBER LIABILITY INSURANCE OVERVIEW FOR Prepared by: Evan Taylor NFP Targeted Industries Business Sector Financial Services 10% Non-Profit 11% Retail 10% Other 37% Other 18% Type of Data PII 40% Professional

More information

Cyber-Insurance: Fraud, Waste or Abuse?

Cyber-Insurance: Fraud, Waste or Abuse? SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major

More information

Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity

Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity 2017 Public Safety Employees Pension & Benefits Conference Ronald A. King (517) 318-3015 rking@ I am convinced that there are only

More information

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them PROVIDED BY HUB INTERNATIONAL October 25th, 2016 W W W. C H I C A G O L A N D R I S K F O R U M. O R G AGENDA 1. The evolution of

More information

Insuring your online world, even when you re offline. Masterpiece Cyber Protection

Insuring your online world, even when you re offline. Masterpiece Cyber Protection Insuring your online world, even when you re offline Masterpiece Cyber Protection Protect your online information from being an open network 97% of Chubb clients who had a claim paid were highly satisfied

More information

CYBER LIABILITY REINSURANCE SOLUTIONS

CYBER LIABILITY REINSURANCE SOLUTIONS CYBER LIABILITY REINSURANCE SOLUTIONS CYBER STRONG. CYBER STRONG. State-of-the-Art Protection for Growing Cyber Risks Businesses of all sizes and in every industry are experiencing an increase in cyber

More information

A GUIDE TO CYBER RISKS COVER

A GUIDE TO CYBER RISKS COVER A GUIDE TO CYBER RISKS COVER Cyber risk the daily business threat to SMEs Cyber risks and data security breaches are a daily threat to everyday business. Less than 10% of UK companies have cyber insurance

More information

Cyber Risks & Insurance

Cyber Risks & Insurance Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of

More information

Cyber Enhancement Endorsement

Cyber Enhancement Endorsement Cyber Enhancement Endorsement What is Cyber Risk? Why should I buy Cyber Risk insurance? What is the cost? Why should I buy Great American s product? Who do I contact to learn more about Cyber Risk Insurance?

More information

Protecting Against the High Cost of Cyberfraud

Protecting Against the High Cost of Cyberfraud Protecting Against the High Cost of Cyberfraud THE ROLE OF CYBER LIABILITY INSURANCE IN YOUR RISK MANAGEMENT STRATEGY Paying the Price...2 The Ransomware Scourge...3 Policy Provisions...3 Management Liability...4

More information

Cyber Liability Insurance. Data Security, Privacy and Multimedia Protection

Cyber Liability Insurance. Data Security, Privacy and Multimedia Protection Cyber Liability Insurance Data Security, Privacy and Multimedia Protection Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such

More information

Surprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their

Surprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their When It Comes to Data Breaches, Why Are Corporations Largely Uninsured? Under Attack and Unprepared: Argo Group Cyber Insurance Survey 2017 Surprisingly, only 40 percent of small and medium-sized enterprises

More information

Cyber Insurance for Lawyers

Cyber Insurance for Lawyers Cyber Insurance for Lawyers Learn What Most People Don t Know About a Cyber Insurance Policy Cyber Crime Trends NAS Cybercrime 2017 Claims Analysis Report 1 in 4 Claims Exceeding $200,000 Average Cybercrime

More information

Cyber Risks & Cyber Insurance

Cyber Risks & Cyber Insurance Cyber Risks & Cyber Insurance Terry Quested Executive Director Associated Risk Managers of Ohio Darren Faye Vice President Leonard Insurance / Assured Partners Legal Disclaimer The views, information and

More information

Insuring! Agreement Claim! Scenario Coverage! Response Network &! Information! Security Liability A hacker successfully obtains sensitive, personal information from the insured s computer system. As a

More information

NZI LIABILITY CYBER. Are you protected?

NZI LIABILITY CYBER. Are you protected? NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is

More information

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017 You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business

More information

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report

More information

At the Heart of Cyber Risk Mitigation

At the Heart of Cyber Risk Mitigation At the Heart of Cyber Risk Mitigation De-risking Cyber Threats with Insurance Vikram Singh Abstract Management of risks is an integral part of the insurance industry. Companies have succeeded in identifying

More information

Vaco Cyber Security Panel

Vaco Cyber Security Panel Vaco Cyber Security Panel ISACA Charlotte Chapter December 5 th, 2017 Vaco is an international talent solutions firm headquartered in Nashville, Tennessee, with more than 35 locations around the globe.

More information

Cyber Risk Management

Cyber Risk Management Cyber Risk Management Privacy & Data Protection Agenda 2 Introductions Risk Management 101 Defining & Quantifying a Breach Prevention, Mitigation & Transfer Strategies Finance Strategy- Cyber Insurance

More information

Cyber Liability Insurance for Sports Organizations

Cyber Liability Insurance for Sports Organizations Cyber Liability Insurance for Sports Organizations The biggest threat to your organization or club isn t a loss of funds. It s a loss of data. From online sign-ups and payment systems to social media

More information

Privacy and Data Breach Protection Modular application form

Privacy and Data Breach Protection Modular application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

Cyber, Data Risk and Media Insurance Application form

Cyber, Data Risk and Media Insurance Application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

Your defence toolkit. How to combat the cyber threat

Your defence toolkit. How to combat the cyber threat Your defence toolkit How to combat the cyber threat Contents The threat of cyber crime 4 How UK businesses are targeted 6 Case studies 8 Why cyber security is so important to manufacturers now 10 The

More information

Cyber Liability A New Must Have Coverage for Your Soccer Organization

Cyber Liability A New Must Have Coverage for Your Soccer Organization Cyber Liability A New Must Have Coverage for Your Soccer Organization Presented By: Pat Pullen Jeanne Zabuska President Underwriting Manager February 17, 2012 Why do you need Cyber Liability? Have a web

More information

Cyber Risk Mitigation

Cyber Risk Mitigation Cyber Risk Mitigation Eide Bailly Howalt + McDowell Insurance Introduction Meet your presenters Eric Pulse Risk Advisory Director 20 years in the public accounting and consulting industry providing information

More information

Claims Made Basis. Underwritten by Underwriters at Lloyd s, London

Claims Made Basis. Underwritten by Underwriters at Lloyd s, London APPLICATION for: NetGuard Plus Claims Made Basis. Underwritten by Underwriters at Lloyd s, London tice: The Policy for which this Application is made applies only to Claims made against any of the Insureds

More information

Cyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby

Cyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby Cyberinsurance: Necessary, Expensive and Confusing as Hell Presenters: Sharon Nelson and Judy Selby Setting the stage 2018 report from PwC one-third of US businesses have some form of cyberinsurance PwC

More information

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION NOTICE: THIS APPLICATION IS FOR CLAIMS-MADE AND REPORTED COVERAGE, WHICH APPLIES ONLY TO CLAIMS FIRST MADE AND REPORTED IN WRITING DURING THE POLICY PERIOD, OR ANY EXTENDED REPORTING PERIOD. THE LIMIT

More information

Data Breach Program Pricing Companies with revenues less than $1,000,000

Data Breach Program Pricing Companies with revenues less than $1,000,000 Data Breach Program Pricing Companies with revenues less than Limit of Liability Aggregate $250,000 $500,000 $2,000,000 Retention $1,000 $1,000 $1,000 $1,000 25,000 records $250,000 $500,000 Security &

More information

Cyber Risk Insurance. Frequently Asked Questions

Cyber Risk Insurance. Frequently Asked Questions Cyber Risk Insurance Frequently Asked Questions Frequently Asked Questions What is Cyber Risk? Why should I buy Cyber Risk Insurance? What is the cost? Who is Great American Insurance? Why should I buy

More information

Cybersecurity Privacy and Network Security and Risk Mitigation

Cybersecurity Privacy and Network Security and Risk Mitigation Ask the Experts at fi360 2016 Cybersecurity Privacy and Network Security and Risk Mitigation Gary Sutherland, NAPLIA CEO Brian Edelman, Financial Computer Inc. CEO Paul Smith, AIF NAPLIA SVP SEC s 1st

More information

Cyber Security Liability:

Cyber Security Liability: www.mcgrathinsurance.com Cyber Security Liability: How to protect your business from a cyber security threat or breach. 01001101011000110100011101110010011000010111010001101000001000000100100101101110011100110111

More information

DATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY

DATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. DATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY Coverage under this endorsement is subject to the following: PART 1 RESPONSE

More information

ACORD 834 (2014/12) - Cyber and Privacy Coverage Section

ACORD 834 (2014/12) - Cyber and Privacy Coverage Section ACORD 834 (2014/12) - Cyber and Privacy Coverage Section ACORD 834, Cyber and Privacy Coverage Section, is used to apply for cyber and privacy coverage. The form was designed to be used in conjunction

More information

An Overview of Cyber Insurance at AIG

An Overview of Cyber Insurance at AIG An Overview of Cyber Insurance at AIG Michael Lee, MBA Cyber Business Development Manager AIG 2018 Brittney Mishler, ARM Cyber Casualty Underwriting Specialist AIG Cyber Insurance It s a peril, not a product

More information

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage James P. Bobotek james.bobotek@pillsburylaw.com (202) 663-8930 Pillsbury Winthrop Shaw Pittman LLP DOCUMENT

More information

When The Wind Blows: Renewable Energy Risk Management Strategies

When The Wind Blows: Renewable Energy Risk Management Strategies When The Wind Blows: Renewable Energy Risk Management Strategies Small Wind Conference 2017 1 Overview About HUB Insurance Solutions General Coverage Overview Stakeholders Cyber Liability Engineers and

More information

Application - All States

Application - All States Carrier: Application - All States This application is for a Claims Made policy. Please read your policy carefully. INSURANCE OVERVIEW 1. Coverage requested Please indicate the coverage part(s) and limit(s)

More information

Cyber & Privacy Liability and Technology E&0

Cyber & Privacy Liability and Technology E&0 Cyber & Privacy Liability and Technology E&0 Risks and Coverage Geoff Kinsella Partner http://map.norsecorp.com http://www.youtube.com/watch?v=f7pyhn9ic9i Presentation Overview 1. The Cyber Evolution 2.

More information

Electronic Commerce and Cyber Risk

Electronic Commerce and Cyber Risk Electronic Commerce and Cyber Risk Fifth Third Bank All Rights Reserved Reality and Solutions Objectives for Today What I will cover How banks are changing How the public is changing How the laws are changing

More information

Sara Robben, Statistical Advisor National Association of Insurance Commissioners

Sara Robben, Statistical Advisor National Association of Insurance Commissioners Moderated by Daniel Eliot, Director Small Business Programs National Cyber Security Alliance Sara Robben, Statistical Advisor National Association of Insurance Commissioners Angela Gleason, Senior Counsel

More information

AXIS PRO PRIVASURE INSURA

AXIS PRO PRIVASURE INSURA AXIS Insurance Telephone: (678) 746-9000 111 S. Wacker Dr., Ste. 3500 Toll-Free: (866) 259-5435 Chicago, IL 60606 Facsimile: (678) 746-9315 Website: www.axiscapital.com/en-us/insurance/us#professional-lines

More information

Cyber COPE. Transforming Cyber Underwriting by Russ Cohen

Cyber COPE. Transforming Cyber Underwriting by Russ Cohen Cyber COPE Transforming Cyber Underwriting by Russ Cohen Business Descriptor How tall is your office building? How close is the nearest fire hydrant? Does the building have an alarm system? Insurance companies

More information

Does the Applicant provide data processing, storage or hosting services to third parties? Yes No

Does the Applicant provide data processing, storage or hosting services to third parties? Yes No BEAZLEY BREACH RESPONSE APPLICATION NOTICE: THIS POLICY S LIABILITY INSURING AGREEMENTS PROVIDE COVERAGE ON A CLAIMS MADE AND REPORTED BASIS AND APPLY ONLY TO CLAIMS FIRST MADE AGAINST THE INSURED DURING

More information

HEALTHCARE INDUSTRY SESSION CYBER IND 011

HEALTHCARE INDUSTRY SESSION CYBER IND 011 HEALTHCARE INDUSTRY SESSION CYBER IND 011 Speakers: Jody Westby, Chief Executive Officer, Global Cyber Risk René Siemens, Partner, Covington & Burling LLP Brent Rieth, Senior Vice President and Team Leader,

More information

A broker guide to selling cyber insurance. CyberEdge Sales Playbook

A broker guide to selling cyber insurance. CyberEdge Sales Playbook A broker guide to selling cyber insurance CyberEdge Sales Playbook IN 5 Cyber is consistently one of the top three risks businesses face, with the average cost of a breach at approximately $4.3 million.

More information

Add our expertise to yours Protection from the consequences of cyber risks

Add our expertise to yours Protection from the consequences of cyber risks CyberEdge THIS INFORMATION IS INTENDED FOR INSURANCE BROKERS AND OTHER INSURANCE PROFESSIONALS ONLY Add our expertise to yours Protection from the consequences of cyber risks What is CyberEdge? 2 CyberEdge

More information

Evaluating Your Company s Data Protection & Recovery Plan

Evaluating Your Company s Data Protection & Recovery Plan Evaluating Your Company s Data Protection & Recovery Plan CBIA Cybersecurity Webinar Series 11AM 12PM Part V. Presented by: Stewart Tosh Charles Bellingrath Date: December 7, 2017 Today s presenters Stewart

More information

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY Agenda Threat Landscape and Trends Breach Response Process Pitfalls and Critical Points BBR Services Breach Prevention

More information

HOW TO INSURE CYBER RISKS? Oulu Industry Summit

HOW TO INSURE CYBER RISKS? Oulu Industry Summit HOW TO INSURE CYBER RISKS? Oulu Industry Summit 2017 6.10.2017 Panu Peltomäki Liability and Financial Lines Practice Leader Marsh Oy Marsh A Leader in Quality, Scope, and Scale GLOBAL RISKS OF CONCERN

More information

Cyber breaches: are you prepared?

Cyber breaches: are you prepared? Cyber breaches: are you prepared? Presented by Michael Gapes, Partner Overview What is cyber crime? What are the risks and impacts to your business if you are a target? What are your responsibilities do

More information

DEBUNKING MYTHS FOR CYBER INSURANCE

DEBUNKING MYTHS FOR CYBER INSURANCE SESSION ID: GRC-F02 DEBUNKING MYTHS FOR CYBER INSURANCE Robert Jones Global Head of Financial Lines Specialty Claims AIG Garin Pace Cyber Product Leader AIG @Garin_Pace Introduction What Is Cyber Insurance?

More information

LIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE

LIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE I N S U R A N C E a g a i n s t c y b e r r i s k s After "prevention", risk covering is always the next step. Good insurance policies have the substantial merit allowing people to progress, even choosing

More information

Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage

Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage Presenting a live 90-minute webinar with interactive Q&A Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage THURSDAY, OCTOBER 5, 2017 1pm Eastern 12pm Central

More information

Payment Card Industry Data Security Standards (PCI DSS) Initial Training

Payment Card Industry Data Security Standards (PCI DSS) Initial Training Payment Card Industry Data Security Standards (PCI DSS) Initial Training PCI DSS Training Content What topics will this training cover? What is PCI DSS? Objectives of PCI DSS Common Terminology Background

More information

MEASURING & PRICING THE COST DRIVERS OF A CYBER SECURITY RISK EVENT

MEASURING & PRICING THE COST DRIVERS OF A CYBER SECURITY RISK EVENT MEASURING & PRICING THE COST DRIVERS OF A CYBER SECURITY RISK EVENT IOWA ACTUARIES CLUB 2/25/16 EDUCATION DAY PRESENTED BY KEITH BURKHARDT, V.P. KRAUS-ANDERSON INSURANCE Overview I. Why are cyber security

More information

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and data risks to your business,

More information

Cyber Risk Proposal Form

Cyber Risk Proposal Form Cyber Risk Proposal Form Company or trading name Address Postcode Country Telephone Email Website Date business established Number of employees Do you have a Chief Privacy Officer (or Chief Information

More information

Cyber Insurance I don t think it means what you think it means

Cyber Insurance I don t think it means what you think it means SESSION ID: GRC-T10 Cyber Insurance I don t think it means what you think it means John Loveland Global Head of Cyber Security Strategy & Marketing Verizon Enterprise Solutions Plot A brief history of

More information

MEDIATECH INSURANCE APPLICATION THIS APPLICATION IS FOR A CLAIMS MADE POLICY PLEASE INDICATE WHICH COVERAGES ARE REQUIRED Technology and Professional

MEDIATECH INSURANCE APPLICATION THIS APPLICATION IS FOR A CLAIMS MADE POLICY PLEASE INDICATE WHICH COVERAGES ARE REQUIRED Technology and Professional THIS APPLICATION IS FOR A CLAIMS MADE POLICY PLEASE INDICATE WHICH COVERAGES ARE REQUIRED Technology and Professional Services: $100,000 $250,000 $500,000 $1,000,000 $2,000,000 Other:$ Technology Product

More information

Paul Jones, Jones & Co. Kathleen Rice, Faegre Baker Daniels, LLP

Paul Jones, Jones & Co. Kathleen Rice, Faegre Baker Daniels, LLP HOW TO NAVIGATE THE LANDSCAPE OF GLOBAL PRIVACY AND DATA PROTECTION Paul Jones, Jones & Co. Kathleen Rice, Faegre Baker Daniels, LLP Topics to Cover General Concepts Increased U.S. enforcement activity

More information

CYBER RISK INSURANCE. Proposal Form

CYBER RISK INSURANCE. Proposal Form CYBER RISK INSURANCE Proposal Form 2 Cyber Risk Insurance Cyber Risk Insurance Proposal Form Broker Name of Proposer Company number Charity Registration number Business Description Registered Address Post

More information

Data Security Addendum for inclusion in the Contract between George Mason University (the University ) and the Selected Firm/Vendor

Data Security Addendum for inclusion in the Contract between George Mason University (the University ) and the Selected Firm/Vendor Data Security Addendum for inclusion in the Contract between George Mason University (the University ) and the Selected Firm/Vendor This Addendum is applicable only in those situations where the Selected

More information

Cyber Liability State of the Insurance Market & Risk Update Sept 8, ISACA North Texas

Cyber Liability State of the Insurance Market & Risk Update Sept 8, ISACA North Texas Cyber Liability State of the Insurance Market & Risk Update Sept 8, 2016 ISACA North Texas Agenda Introduction Cyber Liability Overview State of Insurance Regulatory Update Questions and Discussion 2 Speakers

More information

DATA COMPROMISE COVERAGE FORM

DATA COMPROMISE COVERAGE FORM DATA COMPROMISE DATA COMPROMISE COVERAGE FORM Various provisions in this policy restrict coverage. Read the entire policy carefully to determine rights, duties and what is and is not covered. Throughout

More information

CYBER LIABILITY INSURANCE: CLAIMS ISSUES AND TRENDS THAT AUDITORS NEED TO KNOW

CYBER LIABILITY INSURANCE: CLAIMS ISSUES AND TRENDS THAT AUDITORS NEED TO KNOW CYBER LIABILITY INSURANCE: CLAIMS ISSUES AND TRENDS THAT AUDITORS NEED TO KNOW INSURANCE RISK MANAGEMENT EMPLOYEE BENEFITS Presented by: Douglas R. Jones, CPCU, ARM, Senior Vice President, Principal www.rhsb.com

More information

Cyber Security & Insurance Solution Karachi, Pakistan

Cyber Security & Insurance Solution Karachi, Pakistan March 2017 Cyber Security & Insurance Solution Karachi, Pakistan Ram Garg CFA, MBA Financial & Casualty Line J B Boda & Co (Singapore) Pte Ltd Karachi Insurance Institute Agenda Cyber Risk - Background

More information

Chubb Cyber Enterprise Risk Management

Chubb Cyber Enterprise Risk Management Chubb Cyber Enterprise Risk Management Fact Sheet Financial Lines Chubb Cyber Enterprise Risk Management When it comes to a data security breach or privacy loss, it isn t a matter of if it will happen

More information

Summary of Form Changes e-md /MEDEFENSE Plus Insurance Policy (from version P1818CE-0115 to P1818CE-0716)

Summary of Form Changes e-md /MEDEFENSE Plus Insurance Policy (from version P1818CE-0115 to P1818CE-0716) GENERAL CHANGES 1. Notice Provisions Summary of Form Changes e-md /MEDEFENSE Plus Insurance Policy (from version P1818CE-0115 to P1818CE-0716) a. Currently, the policy requires notice to the Underwriters

More information

Tech and Cyber Claims Services

Tech and Cyber Claims Services Tech and Cyber Claims Services Insurance Tech, Cyber Claims and our Breach Response Service The technology industry is a significant area of expertise for the Firm where we advise on contentious and non-contentious

More information

CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING

CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING 2015 Verizon Data Breach Report 79,790 security incidents 2,122 confirmed data breaches Top industries affected: Public, Information,

More information

APPLICATION FOR DATA BREACH AND PRIVACY LIABILITY, DATA BREACH LOSS TO INSURED AND ELECTRONIC MEDIA LIABILITY INSURANCE

APPLICATION FOR DATA BREACH AND PRIVACY LIABILITY, DATA BREACH LOSS TO INSURED AND ELECTRONIC MEDIA LIABILITY INSURANCE Deerfield Insurance Company Evanston Insurance Company Essex Insurance Company Markel American Insurance Company Markel Insurance Company Associated International Insurance Company DataBreach SM APPLICATION

More information

The Economic Impact of Advanced Persistent Threats. Sponsored by IBM. Ponemon Institute Research Report

The Economic Impact of Advanced Persistent Threats. Sponsored by IBM. Ponemon Institute Research Report ` The Economic Impact of Advanced Persistent Threats Sponsored by IBM Independently conducted by Ponemon Institute LLC Publication Date: May 2014 Ponemon Institute Research Report The Economic Impact of

More information

REF STANDARD PROVISIONS

REF STANDARD PROVISIONS This Data Protection Addendum ( Addendum ) is an add- on to the Purchasing Terms and Conditions. It is applicable only in those situations where the Selected Firm/Vendor provides goods or services under

More information

Cyber a risk on the rise. Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist

Cyber a risk on the rise. Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist Cyber a risk on the rise Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist Cyber data breaches reaching a new level 1 000 000 000 Source: http://money.cnn.com/2016/09/22/technology/yahoo-data-breach/

More information

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do ARTICLE Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do By Gene Griggs and Saad Gul This article analyzes cybersecurity issues for retirement plans. Introduction

More information

Visa s Approach to Card Fraud and Identity Theft

Visa s Approach to Card Fraud and Identity Theft Visa s Approach to Card Fraud and Identity Theft Paul Russinoff June 7, 2007 Discussion Topics Visa s Comprehensive Security Approach Multiple Layers Commitment to Cardholders Consumer Tips Protecting

More information

2017 Cyber Security and Data Privacy Study

2017 Cyber Security and Data Privacy Study RESEARCH REPORT DECEMBER 2017 2017 Cyber Security and Data Privacy Study How does your company compare? TABLE OF CONTENTS 05 How does your company compare? 06 Key findings 08 Cyber security and data privacy

More information

Payment Card Industry Training 2014

Payment Card Industry Training 2014 Payment Card Industry Training 2014 Phone Line Terminal & Hosted Order Page/Secure Acceptance Redirect Merchants Contact * Carole Fallon * 614-292-7792 * fallon.82@osu.edu Updated May 2014 AGENDA A. Payment

More information

PAI Secure Program Guide

PAI Secure Program Guide PAI Secure Program Guide A complete guide to understanding the Payment Card Industry Data Security Requirements (PCI DSS) and utilizing the PAI Secure Program Welcome to PAI Secure, a unique 4-step PCI-DSS

More information

Cyber ERM Proposal Form

Cyber ERM Proposal Form Cyber ERM Proposal Form This document allows Chubb to gather the needed information to assess the risks related to the information systems of the prospective insured. Please note that completing this proposal

More information

Professional Indemnity and Cyber Insurance for Technology Companies Summary of cover

Professional Indemnity and Cyber Insurance for Technology Companies Summary of cover Professional Indemnity and Cyber Insurance for Technology Companies Summary of cover Contents Introduction 2 Section 1: Professional Indemnity 2 Section 2: Cyber Insurance 2 Extensions that apply to your

More information

Data Breach Financial Protection Program Terms and Conditions

Data Breach Financial Protection Program Terms and Conditions Data Breach Financial Protection Program Terms and Conditions The Data Breach Financial Protection Program (the Program ) is a comprehensive expense reimbursement program, provided with some Netsurion

More information

Ball State University

Ball State University PCI Data Security Awareness Training Agenda What is PCI-DSS PCI-DDS Standards Training Definitions Compliance 6 Goals 12 Security Requirements Card Identification Basic Rules to Follow Myths 1 What is

More information

Privacy and Security Issues Facing Qualified Retirement Plans

Privacy and Security Issues Facing Qualified Retirement Plans SECURIAN FINANCIAL 1 Privacy and Security Issues Facing Qualified Retirement Plans Theodore Schmelzle, JD, CIPP/US Senior Director, Retirement Solutions November 2018 SECURIAN FINANCIAL 2 Agenda Why advisors,

More information

Best Practice: Responding to a Privacy Breach

Best Practice: Responding to a Privacy Breach Best Practice: Responding to a Privacy Breach Introduction The Access to Information and Protection of Privacy Act (ATIPP Act or Act) has a dual purpose: to make public bodies more accountable to the public

More information

Untangling the Web of Cyber Risk: An Insurance Perspective

Untangling the Web of Cyber Risk: An Insurance Perspective Untangling the Web of Cyber Risk: An Insurance Perspective BCAW: May 16 th, 2017 Gregory Eskins National Cyber Practice Leader gregory.eskins@marsh.com http://funpicc.blogspot.ca/2011/04/your-password-is-incorrect-will-ferrell.html

More information

THE GENERAL DATA PROTECTION REGULATION

THE GENERAL DATA PROTECTION REGULATION THE GENERAL DATA PROTECTION REGULATION IMPLICATIONS FOR ORGANISATIONS IN THE MIDDLE EAST The General Data Protection Regulation (GDPR) is a major revision to data protection laws in the EU and has potential

More information

Administration Policy

Administration Policy Administration Policy Complete Policy Title: Policy for Acceptance of Payment Cards and ecommerce Payments Approved by: Vice-President (Administration) Date of Original Approval: August 2005 Responsible

More information

2.1.3 CARDHOLDER DATA SECURITY

2.1.3 CARDHOLDER DATA SECURITY University of Oxford Finance Division FINANCIAL POLICY 2.1.3 CARDHOLDER DATA SECURITY Date: 27 June 2017 Version: 1.0 Status: Draft Author: Bridget Midwinter TABLE OF CONTENTS Page Purpose... 3 Objectives...

More information

Cyber Liability Launch Event Moscow

Cyber Liability Launch Event Moscow Allianz Global Corporate & Specialty Cyber Liability Launch Event Moscow AGCS November 2016 Cyber Insurance market Stand Alone Business USA USA Started in the early to mid 1990 s 50 Started + carriers

More information

BEAZLEY BREACH RESPONSE INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES SHORT FORM APPLICATION

BEAZLEY BREACH RESPONSE INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES SHORT FORM APPLICATION BEAZLEY BREACH RESPONSE INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES SHORT FORM APPLICATION NOTICE: INSURING AGREEMENTS I.A., I.C., I.D. AND I.F. OF THIS POLICY PROVIDE COVERAGE

More information

Healthcare Data Breaches: Handle with Care.

Healthcare Data Breaches: Handle with Care. Healthcare Data Breaches: Handle with Care November 13, 2012 ID Experts Webinar www.idexpertscorp.com The material presented in this presentation is not intended to provide legal or other expert advice

More information

Comprehensive Coverage for Not-for-Profit Organizations

Comprehensive Coverage for Not-for-Profit Organizations Comprehensive Coverage for Not-for-Profit Organizations Including Directors and Officers Liability (D&O), Employment Practices (EPL), and Fiduciary Liability (FL) Insurance Solutions Chubb is pleased

More information

MANAGING DATA BREACH

MANAGING DATA BREACH MANAGING DATA BREACH Beazley is a specialist insurer and leading provider of cyber insurance. Michael Phillips is a Claims Manager in the Technology, Media, and Business division of Beazley, and focuses

More information

APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London

APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London SECTION I. GENERAL INFORMATION 1. Name of Applicant: Physical Address: (as it should appear

More information

Port Jefferson Union Free School District. Annual Risk Assessment Update Pertaining to the Internal Controls Of District Operations.

Port Jefferson Union Free School District. Annual Risk Assessment Update Pertaining to the Internal Controls Of District Operations. Update Pertaining to the Internal Controls Of District Operations INDEPENDENT ACCOUNTANTS REPORT ON APPLYING AGREED UPON PROCEDURES The Board of Education Port Jefferson Union Free School District We have

More information