Sara Robben, Statistical Advisor National Association of Insurance Commissioners

Similar documents
Surprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their

Small business, big risk: Lack of cyber insurance is a serious threat

NAIC BLANKS (E) WORKING GROUP

PRIVACY AND CYBER SECURITY

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY

Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do

Cyber Risks & Insurance

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

At the Heart of Cyber Risk Mitigation

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

Cyber-Insurance: Fraud, Waste or Abuse?

ANALYSIS & ASSESSMENT OF TECHNOLOGY FROM A BOARD S PERSPECTIVE STEPHANIE L. BUCKLEW SLB CONSULTING

An Overview of Cyber Insurance at AIG

A FRAMEWORK FOR MANAGING CYBER RISK APRIL 2015

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group

Your defence toolkit. How to combat the cyber threat

A GUIDE TO CYBER RISKS COVER

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION

Cyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby

Evaluating Your Company s Data Protection & Recovery Plan

Cyber Risk Management

Cybersecurity Privacy and Network Security and Risk Mitigation

Vaco Cyber Security Panel

CYBER LIABILITY REINSURANCE SOLUTIONS

The working roundtable was conducted through two interdisciplinary panel sessions:

Privacy and Security Issues Facing Qualified Retirement Plans

Chubb Cyber Enterprise Risk Management

Cyber Liability Insurance. Data Security, Privacy and Multimedia Protection

ACORD 834 (2014/12) - Cyber and Privacy Coverage Section

Cyber Insurance for Lawyers

HIPAA AND YOU 2017 G E R A L D E MELTZER, MD MSHA

2016 Risk Practices Survey

DEBUNKING MYTHS FOR CYBER INSURANCE

HOW TO INSURE CYBER RISKS? Oulu Industry Summit

Cyber Incident Response When You Didn t Have a Plan

Te c h n o l o g y T r e n d s a n d I s s u e s

Determining Whether You Are a Business Associate

ARE YOU HIP WITH HIPAA?

Cyber Risks & Cyber Insurance

Cyber Risk Proposal Form

Port Jefferson Union Free School District. Annual Risk Assessment Update Pertaining to the Internal Controls Of District Operations.

MANAGING DATA BREACH

Aon Cyber Risk and Directors & Officers Forum CRM011

NZI LIABILITY CYBER. Are you protected?

Cyber breaches: are you prepared?

CAPITAL WORKPAPERS TO PREPARED DIRECT TESTIMONY OF GAVIN H. WORDEN ON BEHALF OF SOUTHERN CALIFORNIA GAS COMPANY BEFORE THE PUBLIC UTILITIES COMMISSION

Insuring your online world, even when you re offline. Masterpiece Cyber Protection

Cyber Risk Mitigation

Privacy Liability & Data Breach Management Cyber Insurance as a Customer Privacy Protection Tool

Cyber Enhancement Endorsement

Add our expertise to yours Protection from the consequences of cyber risks

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them

GACC MIDWEST LUNCHEON SERIES

CYBER RISK INSURANCE. Proposal Form

H 7789 S T A T E O F R H O D E I S L A N D

Cyber Risk Trends: 2017 Wrap-Up. January 30 th, 2018, 11 AM Eastern

Cyber COPE. Transforming Cyber Underwriting by Russ Cohen

Fraud and Cyber Insurance Discussion. Will Carlin Ashley Bauer

LIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE

Cyber ERM Proposal Form

Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage

Cyber Risk & Insurance

Cyber Security Liability:

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage

Cyber Risk: A Survivors. Guide for Title Goes Here

We re Under Cyberattack Now What?! John Mullen, Partner/Co-founder, Mullen Coughlin Jason Bucher, Senior Underwriting Manager, Schinnerer Cyber

Cyber Risk Insurance. Frequently Asked Questions


Cyber a risk on the rise. Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist

INFORMATION AND CYBER SECURITY POLICY V1.1

Tech and Cyber Claims Services

2014 The Hartford Steam Boiler Inspection and Insurance Company. All rights reserved.

Acceptance of our terms and conditions

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH

Cyber & Privacy Liability and Technology E&0

ZURICH LAWYERS PROFESSIONAL LIABILITY INSURANCE APPLICATION

Untangling the Web of Cyber Risk: An Insurance Perspective

Electronic Banking Service Agreement and Disclosure

Equifax Data Breach: Your Vital Next Steps

FM Global. First-Party Property Cyber Coverage

Data Thefts and Protecting Client Tax Information

2017 Cyber Security and Data Privacy Study

Simplified Prospectus

CyberRisk: What we know and what we don't know

The Risk-based Approach to Data Breach Response Meeting mounting expectations for effective, relevant solutions

Cyber Liability State of the Insurance Market & Risk Update Sept 8, ISACA North Texas

HIPAA Compliance Guide

Protecting Against the High Cost of Cyberfraud

Cybersecurity Insurance: The Catalyst We've Been Waiting For

Privacy and Data Breach Protection Modular application form

Cyber, Data Risk and Media Insurance Application form

CYBER LIABILITY INSURANCE: CLAIMS ISSUES AND TRENDS THAT AUDITORS NEED TO KNOW

The Internet of Everything: Building Cyber Resilience in a Connected World

Your NAIC Innovation in 2017 and Beyond. Sara Robben May 12, 2017

Cyber Insurance 2017:

THE GENERAL DATA PROTECTION REGULATION

10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office

Personal Information Protection Act Breach Reporting Guide

Transcription:

Moderated by Daniel Eliot, Director Small Business Programs National Cyber Security Alliance Sara Robben, Statistical Advisor National Association of Insurance Commissioners Angela Gleason, Senior Counsel American Insurance Association

www.staysafeonline.org

Goal of 5-Step Approach Is Resilience Know the threats and Identify and Protect your assets Detect problems and respond quickly and appropriately Know what recovery looks like and prepare Thanks to our National Sponsors

Sara Robben, Statistical Advisor National Association of Insurance Commissioners

Small to Midsize Businesses Cybersecurity Sara Robben, Statistical Advisor NAIC

Number of Internet Users 4.2 Billion Number of Google Searches per day 3.5 Billion Number of Active Twitter Users Over 340 Million IoT s Approximately 17 Billion for 2018 Internet Over 50% of all Internet traffic is from an automated source National Association of Insurance Commissioners

National Association of Insurance Commissioners Are Small Businesses at Risk for a Cyber Attack? Small businesses reporting attacks in 2017 47% reported one attack 44% reported two to four attacks 2/3 of these businesses did not strengthen their security following an attack 7 out of 10 businesses aren t prepared to handle cyber attacks Survey Source: Hiscox

Types of Attacks Malware Ransomware Phishing National Association of Insurance Commissioners

National Association of Insurance Commissioners

Potential Impacts to a Business as the result of a cyber incident Financial Loss (47%) Information Breach/Theft (35%) Reputation/Brand Image Issues (14%) Regulatory/Governance and Legal Issues (4%) Source: Insurance Information Institute National Association of Insurance Commissioners

Protection Measures Backup your data Update Operating Systems and other software Passwords NIST Hire an IT consultant Educate your staff National Association of Insurance Commissioners

Data Breaches and How Insurance Helps Cyber-Related losses over the past year cost $188,400 on average (Source: J.D. Power) Business interruption is the most common type of loss from a cyber incident Businesses also experience data loss or corruption, as well as data breach losses Regulatory/Governance and Legal Issues (4%) Most small businesses affected by a breach said their cyber insurance was adequate Source: Insurance Information Institute National Association of Insurance Commissioners

Cyber Insurance Businesses with cyber insurance often have similar coverages Cyber coverage can be combined with other coverages Cyber insurance uptake is still a work in progress Many businesses do not think they need cyber insurance; however, they don t believe they can handle threats Cyber insurance is still poorly understood Many insurers offer cyber insurance or service Source: Insurance Information Institute National Association of Insurance Commissioners

Small Business Information Security: The Fundamentals https://nvlpubs.nist.gov/nistpubs/ir/2016/nist.ir.7621r1.pdf Multi-factor Authentication Basics https://www.nist.gov/itl/tig/back-basics-multi-factor-authentication Backup Basics https://www.pcmag.com/article2/0,2817,2363057,00.asp https://www.thebalancesmb.com/data-backup-is-the-best-data-protection-2947129 Phishing https://www.zdnet.com/article/what-is-phishing-how-to-protect-yourself-from-scam-emails-andmore/ Password Managers https://www.lastpass.com https://www.logmeonce.com/ National Association of Insurance Commissioners

Angela Gleason, Senior Counsel American Insurance Association

Angela Gleason, Senior Counsel

Cyber as a Peril Cybersecurity incidents are a peril - the risk or cause of loss for which insurance coverage is sought.

Cyber Insurance The product typically referred to as cyber insurance is more often referred to in the insurance world as a network security and privacy type of policy that typically provides first and third party coverage for costs arising from defined unauthorized cyber events.

First Party Coverage Examples Insurance that applies to the business s own losses. Notification Costs Investigation and Public Relation Expenses Costs associated with business interruption, theft, and equipment or data restoration

Third Party Coverage Examples Insurance that applies to the costs and damages associated with third party claims. Lawsuit Liability Regulatory Investigations Fines and Penalties

Where do I begin? Understand the risks and consequences your business faces from cyber events Understand your current insurance portfolio/coverages Have a conversation with your insurer and broker

Components of a Cyber Insurance Policy Coverage Grants Exclusions Coverage Limits Pre and Post Services

Benefits of Cyber Insurance Risk Transfer Mechanism Risk Analysis Tool Pre and Post Breach Resources

Takeaways Don t consider cyber insurance a check the box exercise. Make security part of your culture. Ask your insurer and broker questions.

Webinar Series Second Tuesdays 2:00 p.m. EDT Up-Coming Webinars: December 11th New Small Business Cyber Resources for the New Year more webinar topics coming soon To Register: www.staysafeonline.org

National Association of Insurance Commissioners https://www.insureuonline.org/ The American Insurance Association http://www.aiadc.org/ Signature Sponsor Trend Micro www.trendmicro.com Contributing Sponsor MediaPRO https://www.mediapro.com/smb National Cyber Security Alliance www.staysafeonline.org/cybersecure-business