Cyber Risk. October 2017

Similar documents
Cyber Risk & Insurance

Cyber-Insurance: Fraud, Waste or Abuse?

Chubb Cyber Enterprise Risk Management

HEALTHCARE INDUSTRY SESSION CYBER IND 011

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

Your defence toolkit. How to combat the cyber threat

At the Heart of Cyber Risk Mitigation

Cyber Security & Insurance Solution Karachi, Pakistan

Cyber a risk on the rise. Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist

A GUIDE TO CYBER RISKS COVER

Beazley Financial Institutions

Seizing the cyber insurance opportunity

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them

Cybersecurity Insurance: The Catalyst We've Been Waiting For

Cyber insurance: The next frontier. Cyber insurance the next frontier

ConSept: Policy Highlights: Other Coverage Features

CYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner

CYBER INSURANCE GUIDE

Cyber breaches: are you prepared?

SECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD

Cyber Risks & Insurance

Cybersecurity Insurance: New Risks and New Challenges

Add our expertise to yours Protection from the consequences of cyber risks

Closing the Gap. Cyber Security and the insurance sector. July 2017 KPMG.AE KPMG.OM

HOW TO INSURE CYBER RISKS? Oulu Industry Summit

Cyber Risk Insurance. Frequently Asked Questions

2017 Cyber Security and Data Privacy Study

Cyber Enhancement Endorsement

DEBUNKING MYTHS FOR CYBER INSURANCE

Cybersecurity and the Law Seminar

Tech and Cyber Claims Services

Cyber-risk and cyber-controls:

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH

NZI LIABILITY CYBER. Are you protected?

LIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE

Cyber & Privacy Liability and Technology E&0

Cyber Risks A Reinsurer s Perspective on Exposure & Claims. EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP

Cyber Risk Mitigation

Client Risk Solutions Going beyond insurance. Risk solutions for Retail. Start

SECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD

Insuring your online world, even when you re offline. Masterpiece Cyber Protection

An Overview of Cyber Insurance at AIG

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY

S L tr lo a y t d egy s Cyber -Attack

Combined Liability Insurance for Financial Technology Companies Proposal Form

The Internet of Everything: Building Cyber Resilience in a Connected World

Client Risk Solutions Going beyond insurance. Risk solutions for the Healthcare sector. Start

Solving Cyber Risk. Security Metrics and Insurance. Jason Christopher March 2017

Cyber Insurance. How Insuretechs Can Unlock The Opportunity

A FRAMEWORK FOR MANAGING CYBER RISK APRIL 2015

Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity

INSURANCE. Forensic services. Helping to protect your business from fraud, misconduct and non-compliance ADVISORY. kpmg.com/in

ISO Cyber Risk Solutions

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

Bank of America Merrill Lynch Future of Financials Conference 2018

Cyber Security Liability:

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group

Cyber Liability Launch Event Moscow

A Field Guide to Insider Threat Helps Manage the Risk

SECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD

Protecting Against the High Cost of Cyberfraud

red24 Special Risks - Kidnap for Ransom and Extortion Mitigation

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do

INSURING CYBER RISKS WITH A CAPTIVE: IS IT WORTH IT?

Professional Indemnity Insurance for Security Companies Proposal Form

Cyber Insurance for Lawyers

TONGA NATIONAL QUALIFICATIONS AND ACCREDITATION BOARD

Big Data - Transforming Risk and Insurance. Driving Change

What can be done to mitigate cyber risk?

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage

About Chubb. Chubb Limited, the parent company of Chubb, is listed on the New York Stock Exchange (NYSE: CB) and is a component of the S&P 500 index.

Sizing the Standalone Commercial Cyber Insurance Market

GACC MIDWEST LUNCHEON SERIES

Professional Indemnity Insurance for the Designing and Consulting Department of Contractors Proposal Form

2016 Risk Practices Survey

Fraud and Cyber Insurance Discussion. Will Carlin Ashley Bauer

Professional Indemnity Insurance for Surveyors (and related professions) Proposal Form

CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING

Crawford & Company (Canada) Inc. Cyber Loss Management Program

Disrupt and grow Global CEO Outlook

41% of respondents see cybercrime as the most significant risk over the next 24 months.

STEPPING INTO THE BREACH A GUIDE TO CYBER AND DATA INSURANCE

Nation-State Exploitation of Cryptocurrencies

MEASURING & PRICING THE COST DRIVERS OF A CYBER SECURITY RISK EVENT

CYBERSECURITY AND PRIVACY: REDUCING YOUR COMPANY S LEGAL RISK. By: Andrew Serwin

Financial Crime Risk Management

Cyber Risk Proposal Form

A broker guide to selling cyber insurance. CyberEdge Sales Playbook


Structured ScenarioS

DATA LOSS BAROMETER. A global insight into lost and stolen information

UK Motor Insurance Insights: Managing the challenges of digital risk

Terrorism, Zika, CBI - Business Operations Impacted Without Physical Damage? Now What?

Client Risk Solutions Going beyond insurance. Risk solutions for Energy. Oil, Gas and Petrochemical. Start

MANAGING DATA BREACH

The working roundtable was conducted through two interdisciplinary panel sessions:

The AIR Model for Terrorism

Cyber Risk Quantification: Translating technical risks into business terms

Professional Indemnity Insurance for Accountants Proposal Form

Transcription:

Cyber Risk October 2017

The Cyber Landscape

Dimensions to cyber risk Who is likely to target your clients Which jurisdictions do they operate in? Threat Types What is their line of business? Geography How good are they in preventing and detecting an attack? Sector Security 3

Threat Types Organised crime Global, difficult to trace and prosecute Motivation: Financial advantage Impact to business: Financial loss Competitors Competition or rivalry Motivation: Gain business edge Impact to business: IP theft, reputation damage Who would target you, your clients and why? The insider Intentional or unintentional Motivation: Grudge, financial gain Impact to business: Distribution or destruction, theft of information, reputation loss Hacktivism Hacking inspired by ideology Motivation: Shifting allegiances dynamic, unpredictable Impact to business:public distribution, reputation loss State-sponsored Espionage and sabotage Motivation: Political advantage, economic advantage, military advantage Impact to business:disruption or destruction, theft of information, reputational loss 4

CYBER UNDERWORLD 2017 KPMG Management & Risk Consulting Sdn. Bhd., a company incorporated under Malaysian law and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ( KPMG 2016 International ), KPMG LLP, a Swiss a UK entity. limited All rights liability reserved. partnership Printed in Malaysia. and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative 5

Ransomware Major growth in range of groups and tools since Oct 2015 Particular threat to hospitals 44% of business hit in last 24 months Most pay up Small ransoms often only 1 bitcoin Large scale extortion attacks 6

CYBER UNDERWORLD 2017 KPMG Management & Risk Consulting Sdn. Bhd., a company incorporated under Malaysian law and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ( KPMG 2016 International ), KPMG LLP, a Swiss a UK entity. limited All rights liability reserved. partnership Printed in Malaysia. and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative 7

CEO Frauds Criminals now looking beyond financial sector CEO and business email compromise fraud now rampant Sophisticated social engineering Networks of call centres FBI warn received fraud reports totalling $3.1 Billion Recent example of $44 million fraud Attacks now tailored to firms, their business and their employees 8

CYBER UNDERWORLD 2017 KPMG Management & Risk Consulting Sdn. Bhd., a company incorporated under Malaysian law and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ( KPMG 2016 International ), KPMG LLP, a Swiss a UK entity. limited All rights liability reserved. partnership Printed in Malaysia. and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative 9

Persistent and targeted attacks SWIFT attacks followed Attempted $951M fraud at Bank of Bangladesh Speculation over criminal and State links and flow down of techniques $81M successfully transferred to Philippine casinos Other SWIFT attacks followed Weak links? Carbanak signalled a new type of attack Persistent and stealthy 10

Geographic Distribution >30% 25-30% 20-25% 15-20% 10-15% 5-10% Microsoft Security Intelligence Report 20 Malw are encounter rates Q4 2015 11

The Underwriting Landscape

The Underwriting Landscape The current coverage landscape may be split into the following areas with coverages across 1 st Party and 3 rd Party. SME Non-SME US Non US 1 st Party 1 st Party 3 rd Party 1 st Party 1 st Party covers: - Ransomware - Cyber extortion - Network breakdown - Costs of reconstituting data - Remediation costs 3 rd Party covers: - Network liability - Data breach - Multimedia - Breach of privacy 13

New opportunities are emerging in insurance Development of cyber insurance may follow several waves, gradually expanding from core propositions focusing on digital assets to new products covering other types of assets and evensome non-cyber perils Other intangible assets Wave 1 enhancing core propositions with strong crisis management serv ices. Product development Privacy breach Cyber crime & fraud Physical BI with cyber peril Extortion Cyber BI Data & software loss Cyber physical damage Network Security liability IP theft Rep harm Wave 1 Wave 2 Wave 3 Wave 4 Wave 2 improv ing risk modelling and cov erage. Wave 3 expanding to other assets with cy ber triggers. Wave 4 - innov ating to dev elop products to address market gaps. Wave 5 considering to expand scope to cov er other intangible assets with non-cy ber perils. Time horizon 14

Insurance Company Organisational Design Today s Insurance company Property Casualty Financial lines Speciality Crisis Management Others Cyber Cyber Cyber Cyber Tomorrow s Insurance Company Personal lines products Cyber Centre of Excellence Commercial lines products 15

Underwriting and Claims Considerations Initial Risk Assessment Process needs to be quick and not intrusive Difference between SME vs Large SME risks can be managed via a finite number of questions in most cases. Large risks require a larger set of questions. Questionnaires/Interviews On-line assessments External penetration assessments (using 3rd party vendors) Full reviews Underwriting Judgement Challenges of Initial Risk Assessment Reliance of 3rd party data Data only provides a snapshot Insufficient data Previous step does not absolve responsibility of underwriter Underwriter s judgement and skill Assess data Map exposures to coverage offered by policy Large vs SME View on accumulation Claims What does the customer need? SME Dedicated hotline Incident response/crisis Management, NOT indemnity Large Corporates In house teams to deal with initial response Need expert support Some indemnity element Data is available Able to create a view on a client s capabilities: Documentation and process reviews Training Incident response procedures Systems But limitations could exist (e.g. outside-in view only) Pricing Process Limited data on new coverages Issues with historical data 16

Bringing it all together Cyber modelling should be based on a detailed assessment of the threats, activations and motivations underpinning potential attacks; and builds up elements of risk based on detailed intelligence from our cyber experts. Threats Assets Actors Counters Cyber Insights by Sector Identif y the most common threats to organisations, depending on their sector. Lev erage threat intelligence and historical data to identif y credible threats. Valued assets v ary f rom organisation to organisation, howev er, there tend to be similarities within each sector. Use industry experience to map the ty pical v alued assets f or a sector. This can then be conf irmed with each indiv idual prospectiv e policy holder. Organisations can be more susceptible to hacktivists, criminals or state sponsored attacks, to name a f ew, depending on the sector they operate. Use threat data and past incidents to identif y the potential actors behind cy ber attacks. Understand the maturity of dif f erent sectors. Determine credible scenarios of cy ber ev ents f or each sector. Scenarios Construct f orward looking scenarios based on 2 approaches:. Use an existing cy ber ev ent and associated losses and extrapolate to f orm an extreme event which has not been observ ed y et. Use an existing large ev ent as the starting point and then consider if a cy ber attack could be the root cause of a future event of a similar nature. If the answer is y es, then use the ev ent loss prof ile to inf orm the scenario. Modelling Combine cy ber insights and knowledge of the industry, such as: companies in the industry, sy stems or third party v endors employ ed, security v ulnerabilities in the sector, known attacks and measures the companies are taking to def end (or not). Try to assign f requency and sev erity assumptions to the chosen scenario based on detailed analy sis and expert judgement. ( KPMG International ), a Swiss entity. All rights reserved. 17

Frequency Severity Approach Frequency Define the Risk Segment Determine relevant threats for each Risk Segment Annual probability of successful attack from available data/insights - A% DDoS - B% Malware - C% Extortion Adjust for: Forward looking view of risk (Threat Intelligence Reports) Judgement Scoring Selected Parameters (annual probability of successful attack) X% DDoS Y% Malware Z% Extortion Selected Variability +-% +-% +-% Individual Risk Pricing Validation of reserving Sector Country Company profile Counters DDoS Ransomware Extortion Terrorism Severity SIMULATIONS IELR testing Capital Modelling Look at what the immediate effect is on the company Collect information that is a proxy for this effect Create model points from each of the relevant threats to estimate costs split by heads of damage: Breach costs Fines Liability Selected Parameters DDoS $ $ $ Malware $ $ Extortion $ $ $ Selected Variability +-% +-% +-% 18

kpmg.com/uk The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavour to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation. 2017 KPMG LLP, a UK limited liability partnership and a member firm of the KPMG network of independent member firms affiliatedwith KPMG International Cooperative The KPMG name and logo are registered trademarks or trademarks of KPMG International. Create KGS: CRT067112D