A FRAMEWORK FOR MANAGING CYBER RISK APRIL 2015

Similar documents
The Internet of Everything: Building Cyber Resilience in a Connected World

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP

Cyber Security Liability:

MARSH CAPTIVE SOLUTIONS

RISK MANAGEMENT 201 BEST PRACTICES IN FINANCIAL AND PROFESSIONAL LIABILITY CLAIMS MANAGEMENT. June 24, 2015

Cyber Risk Mitigation

The Economic Impact of Advanced Persistent Threats. Sponsored by IBM. Ponemon Institute Research Report

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage

Cyber-Insurance: Fraud, Waste or Abuse?

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity

Cybersecurity Insurance: New Risks and New Challenges

How To Drive Actionable Intelligence On The Big Data Journey. October 15, 2015

Cyber & Privacy Liability and Technology E&0

Untangling the Web of Cyber Risk: An Insurance Perspective

Cyber Risk & Insurance

HOW TO INSURE CYBER RISKS? Oulu Industry Summit

An insurance company s investments in the stocks and bonds of its parents, subsidiaries and affiliates.

INTEGRATING RISK MANAGEMENT AND BUSINESS CONTINUITY

Vaco Cyber Security Panel

Cyber Risks & Insurance

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group

KEEPING JURISDICTIONAL INSPECTIONS ON COURSE:

TERMS 1. OUR PRODUCTS AND SERVICES 2. INFORMATION SERVICES 3. INSTALLED SOFTWARE

INSIGHTS JANUARY Communications, Media, and Technology Risk Study

Enhanced Cyber Risk Management Standards. Advance Notice of Proposed Rulemaking

Sara Robben, Statistical Advisor National Association of Insurance Commissioners

Cybersecurity Insurance: The Catalyst We've Been Waiting For

When The Wind Blows: Renewable Energy Risk Management Strategies

Cyber Enhancement Endorsement

NZI LIABILITY CYBER. Are you protected?

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

Insuring your online world, even when you re offline. Masterpiece Cyber Protection

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them

Cyber Insurance I don t think it means what you think it means

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH

An Overview of Cyber Insurance at AIG

Cyber Risk Insurance. Frequently Asked Questions

Protecting Against the High Cost of Cyberfraud

T A B L E of C O N T E N T S

DEBUNKING MYTHS FOR CYBER INSURANCE

CAPITAL WORKPAPERS TO PREPARED DIRECT TESTIMONY OF GAVIN H. WORDEN ON BEHALF OF SOUTHERN CALIFORNIA GAS COMPANY BEFORE THE PUBLIC UTILITIES COMMISSION

REDUCING TOTAL COST OF RISK THROUGH ANALYTICS

Evaluating Your Company s Data Protection & Recovery Plan

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do

HEALTHCARE INDUSTRY SESSION CYBER IND 011

The working roundtable was conducted through two interdisciplinary panel sessions:

Cyber Liability State of the Insurance Market & Risk Update Sept 8, ISACA North Texas

Cyber Liability Insurance. Data Security, Privacy and Multimedia Protection

Cyber Liability A New Must Have Coverage for Your Soccer Organization

Cyber Risk Management

Cyber a risk on the rise. Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist

At the Heart of Cyber Risk Mitigation

LICENSE AGREEMENT. Security Software Solutions

Data Security Addendum for inclusion in the Contract between George Mason University (the University ) and the Selected Firm/Vendor

Combined Liability Insurance for Financial Technology Companies Proposal Form

Data Breach Program Pricing Companies with revenues less than $1,000,000

CLOUD COMPUTING RISKS AND HOW TO MITIGATE THEM

Cyber Risk Trends: 2017 Wrap-Up. January 30 th, 2018, 11 AM Eastern

ACORD 834 (2014/12) - Cyber and Privacy Coverage Section

Providing greater coverage for the greater good.

HEALTHCARE BREACH TRIAGE

Your defence toolkit. How to combat the cyber threat

CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING

Healthcare Data Breaches: Handle with Care.

Cyber Security & Insurance Solution Karachi, Pakistan

How Does Your Company Handle Distracted Driving

LIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE

MEDIATECH INSURANCE APPLICATION THIS APPLICATION IS FOR A CLAIMS MADE POLICY PLEASE INDICATE WHICH COVERAGES ARE REQUIRED Technology and Professional

Cyber Risks A Reinsurer s Perspective on Exposure & Claims. EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier

Aon Cyber Risk and Directors & Officers Forum CRM011

Claims Made Basis. Underwritten by Underwriters at Lloyd s, London

PRIVACY AND CYBER SECURITY

2018 Small Business Risk Report

ADR Program Professional Liability Insurance and Commercial Liability Insurance Renewal Terms

H 7789 S T A T E O F R H O D E I S L A N D

Second Quarter Fiscal 2018 Investor Presentation

Your Guide to Business Asset Protection

BINDING CORPORATE RULES

Bank of America Merrill Lynch Future of Financials Conference 2018

NOTICE OF CHANGE IN TERMS

Blockchain in Insurance: An Introduction

Solving Cyber Risk. Security Metrics and Insurance. Jason Christopher March 2017

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY

Cyber Risks & Cyber Insurance

2015 EMEA Cyber Impact Report

TERMS OF USE AGREEMENT

Beazley Financial Institutions

Tech and Cyber Claims Services

Cybersecurity Privacy and Network Security and Risk Mitigation

Allocating Risk for Privacy and Data Security in Commercial Contracts and Related Insurance Implications

AXIS PRO PRIVASURE INSURA

Pension Scheme Cyber Resilence Workshop

Cybersecurity and the Law Seminar

Data Protection Agreement

MHEC MASTER PROPERTY PROGRAM BUSINESS INTERRUPTION VALUE REPORTING. March 8, 2018

Cyber Risk Proposal Form

Crawford & Company (Canada) Inc. Cyber Loss Management Program

UK 2015 Cyber Risk Survey Report

Cyber ERM Proposal Form

Transcription:

APRIL 2015

CYBER RISK IS HERE TO STAY Even an unlimited budget for information security will not eliminate your cyber risk. Tom Reagan Marsh Cyber Practice Leader 2

SIMPLIFIED CYBER RISK MANAGEMENT FRAMEWORK Manage Assess Prevent Prepare Transfer Respond Remediate 3

MANAGING CYBER RISK ACROSS THE ENTERPRISE Making cyber risk a corporate risk management issue means engaging areas across the enterprise, including: Finance. Legal. Compliance. Operations. HR. Board. IT. 4

REGULATORY SCRUTINY INCREASING Four steps to managing regulatory scrutiny: 1. Don t leave cyber risk to just the IT department. 2. Look beyond attack prevention. 3. Connect your plans to external stakeholders and resources. 4. Include risk transfer as part of the approach. 5

THREAT LANDSCAPE OBJECTIVE EXAMPLE NUISANCE Access & Propagation Botnets & Spam DATA THEFT CYBER CRIME Economic, Political Advantage Advanced Persistent Threat Group Financial Gain Credit Card Theft HACKTIVISM Defamation, Press & Policy Website Defacements TARGETED DESTRUCTIVE ATTACK Disrupt Operations Deletion of Data CHARACTER Often Automated Persistent Frequently Opportunistic Conspicuous Conflict Driven Source: Mandiant 6

WHAT S AHEAD 2015 and beyond More destructive attacks? Attribution will be more important. Counter-forensics will improve. Attacks will align with conflicts. More threat actors will emerge. More government involvement. A return to standards for nonregulated industries. More reliance on the cloud. More active defense (hunting). Cyber security will continue to be a board issue. Source: Mandiant 7

SECURITY OPERATIONS CHALLENGES Tools & Technology Incident Response Governance Lack endpoint detection. No live response. Data (event) overload. Slow searches. Rely on signature based detection. Needle in a haystack. No threat intel. + + Lack of intel context. No hunting. Ability to quickly sweep and contain. Leverage analytics and anomaly detection. Wide mission. Lack required skill sets. Compliance burden. R&R do not align with organizational model. Source: Mandiant

EFFECTIVE CYBER DEFENSE Minimize organizational risk and allow business to function while under continuous attack. Predictive Continuously measure enterprise attack surface and model potential threat vectors targeted at critical assets and data. Proactive Hunt for intrusions. Discover and remediate / compensate for vulnerabilities. Responsive Rapid analysis and containment of threats. Technology Advanced Cyber Defense Capabilities Intelligence Process Source: Mandiant

EFFECTIVE CYBER DEFENSE: INDICATORS OF COMPROMISE Hunting the network provides the capability to conduct proactive analysis to develop new indicators of compromise (IOC). Mining historical data. IOC sweeps. A mature IOC capability includes: Dedicated individuals to design and build IOCs. Develop and update IOCs regularly (IOC editor). Processes and tools in place to actively check systems for IOCs. Post-incident, hunting assists in ensuring remediation and eradication activities are successful. Source: Mandiant

INTELLIGENCE IS KING Commodity Generated from commodity malware analysis. o Structured output artifacts, domains, MD5s. Curated Generated from FireEye research and profiling. o Unstructured output; APT groups, TTPs, landscape. Community Generated by sharing with industry partners. o Structured and unstructured outputs, validate intelligence. Source: Mandiant

CYBER RISK: A RISK MANAGER S VIEW Cyber risk at John Deere means: 1. The risk of unauthorized access to personally identifiable information (PII). 2. The risk from employee health and HR records, intellectual property, and credit card transactions. Focus has been on PII: How much we have. Where and how it s stored. What we would do if it was lost. Deere is known as a manufacturer, but has a substantial captive finance unit. Source: Deere & Co. 12

CYBER RISK MANAGEMENT EVOLVES Cyber insurance: At Deere, cyber tower has evolved from an engineering E&O policy covering a small contract electronics manufacturing operation that we acquired. Each year we gain a greater understanding of cyber exposures. Closer attention to policy terms and limits, increasing limits at several renewals. Able to demonstrate a robust insurance program to C-suite. Risk management: Learned that there are many cyber stakeholders. Effective cyber insurance needs to be aligned with their interests. IT, legal, compliance, and security. Build relationships and partnerships. They, in turn, appreciate our understanding of the risks and the company s exposures. Source: Deere & Co. 13

CYBER IDEAL: PRIVACY EVENT MODEL 14

RISK MANAGEMENT EVOLUTION When the C-suite asked about cyber, we were able to demonstrate that a robust insurance program was already in place. James P. Morley Manager, Risk Analysis, Deere & Co. 15

CYBER INSURANCE: CATEGORIES OF RISK COVERAGE DESCRIPTION Information Asset Loss The cost to restore data compromised or deleted during a network attack. Cyber Extortion Expenses Costs to pay an extortionist s demands. Business interruption and Extra Expense Privacy and Network Security Liability Reimbursement of lost business income and extra expense following a network failure, including coverage for contingent business interruption. Investigation, assessment, and notification costs in the event of a data breach. Defense and liability resulting from a claim for a security breach. Defense and liability resulting from a claim for a privacy breach Counsel for a privacy regulatory proceeding or investigation Indemnification of any fines or penalties assessed by the regulator from the privacy breach. 16

SUPPLY CHAIN DISRUPTIONS Unplanned network outages: The most significant supply chain disruption exposure. High Impact Some Impact 30 26 27 20 20 12 7 7 5 5 6 6 9 3 3 3 7 3 1 2 6 5 3 2 8 4 11 6 25 9 2 6 5 8 11 5 8 7 2 20 20 14 12 4 5 5 5 9 Source: Zurich 17

CYBER AND PROFESSIONAL LIABILITY: HOW DO THEY OVERLAP? Coverage: Security & Privacy (Cyber) Liability covered claims: Third-party damages resulting from a failure of security or privacy controls. Example: Loss of employee PII. Coverage: Professional Liability (E&O) Covered claims: Third-party damages resulting from professional negligence. Example: Error in software that deletes data stored on customer computers. Third-party damages resulting from coincidence of control failure and professional negligence. Example: Security breach that discloses customer information. 18

CYBER INSURANCE RATES US HISTORICAL RATE (TOTAL PRICE PER MILLION) CHANGES CYBER LIABLIITY All companies Companies revenues of $1B+ Companies revenues less than $1B 8.30% 6.50% 5.40% 5.30% 5.50% 2.50% 3.00% 2.20% 2.30% 1.40% 2.90% 3.10% 1.80% 2.20% 3.70% 3.60% 4.00% 3.50% 2.70% 2.10% 2.10% 2.50% 2.70% 1.00% 0.30% -0.10% 0.00% 2013 Q1 2013 Q2 2013 Q3 2013 Q4 2014 Q1 2014 Q2 2014 Q3 2014 Q4 2015 Q1 19

Cyber Insurance Purchasing For a copy of As Cyber Concerns Broaden, Insurance Purchases Rise, please visit marsh.com, ask your Marsh representative, or send a request to questions@marsh.com.

This document and any recommendations, analysis, or advice provided by Marsh (collectively, the Marsh Analysis ) are not intended to be taken as advice regarding any individual situation and should not be relied upon as such. This document contains proprietary, confidential information of Marsh and may not be shared with any third party, including other insurance producers, without Marsh s prior written consent. Any statements concerning actuarial, tax, accounting, or legal matters are based solely on our experience as insurance brokers and risk consultants and are not to be relied upon as actuarial, accounting, tax, or legal advice, for which you should consult your own professional advisors. Any modeling, analytics, or projections are subject to inherent uncertainty, and the Marsh Analysis could be materially affected if any underlying assumptions, conditions, information, or factors are inaccurate or incomplete or should change. The information contained herein is based on sources we believe reliable, but we make no representation or warranty as to its accuracy. Except as may be set forth in an agreement between you and Marsh, Marsh shall have no obligation to update the Marsh Analysis and shall have no liability to you or any other party with regard to the Marsh Analysis or to any services provided by a third party to you or Marsh. Marsh makes no representation or warranty concerning the application of policy wordings or the financial condition or solvency of insurers or reinsurers. Marsh makes no assurances regarding the availability, cost, or terms of insurance coverage. Marsh is one of the Marsh & McLennan Companies, together with Guy Carpenter, Mercer, and Oliver Wyman. Copyright 2015 Marsh LLC MA15-13380 All rights reserved.