FM Global. First-Party Property Cyber Coverage

Similar documents

A GUIDE TO CYBER RISKS COVER

Cyber breaches: are you prepared?

Cyber & Privacy Liability and Technology E&0

NZI LIABILITY CYBER. Are you protected?

HOW TO INSURE CYBER RISKS? Oulu Industry Summit

Crawford Cyber Risk Services. A definitive solution for cyber-related events

Cyber Enhancement Endorsement

Your defence toolkit. How to combat the cyber threat

Cyber Risks & Insurance

Cyber Risk Insurance. Frequently Asked Questions

CYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner

ELECTRONIC COMMERCE (E-COMMERCE)

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them

HSB Cyber Insurance. Computer, data and cyber-risks insurance Policy document

Cyber a risk on the rise. Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist

Chubb Cyber Enterprise Risk Management

Cyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby

Surprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage

Cyber Risks & Cyber Insurance

Solving Cyber Risk. Security Metrics and Insurance. Jason Christopher March 2017

Cyber Liability Insurance. Data Security, Privacy and Multimedia Protection

Cyber Security Liability:

Property business interruption Policy wording

Cyber Liability: New Exposures

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

Cyber Insurance Policy

Clinic Business Continuity Plan Guidelines

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?

Cyber Risk Mitigation

Cyber Risks A Reinsurer s Perspective on Exposure & Claims. EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH

Property business interruption (technology) Policy wording

Privacy and Security Standards

Trends in Cyber-Insurance Coverage to Meet Insureds Needs

HIPAA SECURITY RISK ANALYSIS

SECURITY POLICY 1. Security of Services. 2. Subscriber Security Administration. User Clearance User Authorization User Access Limitations

LIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE

DATA COMPROMISE COVERAGE FORM

Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity

NAIC BLANKS (E) WORKING GROUP

Does it pay to be cyber-insured

MANAGING DATA BREACH

DATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY

Property Performance Policy Summary of 2017 Coverage Enhancements

Property business interruption (charity and not for profit) Policy wording

Terms and Conditions Cyber Enterprise Risk Management Insurance

australia Canada ireland israel united kingdom United states Rest of world cfcunderwriting.com

Managing E-Commerce Risks

Virus Protection and Personal Internet & Identity Theft Coverage Terms and Conditions

When The Wind Blows: Renewable Energy Risk Management Strategies

Claims Made Basis. Underwritten by Underwriters at Lloyd s, London

Add our expertise to yours Protection from the consequences of cyber risks

Insuring your online world, even when you re offline. Masterpiece Cyber Protection

COMMERCIAL CRIME PROTECTION INSURANCE Policy Summary

Terrorism, Zika, CBI - Business Operations Impacted Without Physical Damage? Now What?

PRIVACY AND CYBER SECURITY

Cyber Risk & Insurance

At the Heart of Cyber Risk Mitigation

Church and Cathedral Policy Changes Update Booklet

Cyber Liability A New Must Have Coverage for Your Soccer Organization

Cyber Liability State of the Insurance Market & Risk Update Sept 8, ISACA North Texas

Cyber Risk Proposal Form

Hartford Steam Boiler (HSB) data security products for Commercial Lines.

Privacy and Data Breach Protection Modular application form

Cyber-Insurance: Fraud, Waste or Abuse?

Sara Robben, Statistical Advisor National Association of Insurance Commissioners

Cyber Liability & Data Breach Insurance Nikos Georgopoulos Oracle Security Executives Breakfast 23 April Cyber Risks Advisor

Cyber, Data Risk and Media Insurance Application form

Computer insurance section

Tech and Cyber Claims Services

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION

Combined Liability Insurance for Financial Technology Companies Proposal Form

A FRAMEWORK FOR MANAGING CYBER RISK APRIL 2015

Professional Indemnity and Cyber Insurance for Technology Companies Summary of cover

Policy Changes Update Booklet

Fraud and Cyber Insurance Discussion. Will Carlin Ashley Bauer

Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage

Evaluating Your Company s Data Protection & Recovery Plan

Cyber Security & Insurance Solution Karachi, Pakistan

Aligning an information risk management approach to BS :2005

CYBER INSURANCE GUIDE

Cyber Liability Launch Event Moscow

Cyber-insurance General terms and conditions

An Overview of Cyber Insurance at AIG

The Internet of Everything: Building Cyber Resilience in a Connected World

Secondary Professional Liability Insurance Program (SPLIP) Questions & answers

TERMS 1. OUR PRODUCTS AND SERVICES 2. INFORMATION SERVICES 3. INSTALLED SOFTWARE

Untangling the Web of Cyber Risk: An Insurance Perspective

A MUST-HAVE GUIDE TO OUR SPECTRUM COVERAGES AND LIMITS.

Would Your Company s Insurance Cover a Cyberattack? 1

HEALTHCARE BREACH TRIAGE

Allocating Risk for Privacy and Data Security in Commercial Contracts and Related Insurance Implications

Form #CYBER-100 (Rev. Nov 6, 2017) Cyber Liability Claims Made and Reported

Policy Document. 01 July Underwritten by Lombard Insurance Company Limited, an Authorised Financial Services Provider (FSP 1596).

2015 EMEA Cyber Impact Report

FAQ. Secondary Professional Liability Insurance Program (SPLIP) for Canadian Engineers and Geoscientists. NEW! As of March 31, 2018

XL SPECIALTY INSURANCE COMPANY

Transcription:

First-Party Property Cyber Coverage

Introduction Cyber is Board of Directors level concern #1 issue for commercial insurance industry Everyone on steep learning curve

Objective and Agenda Understand differences between first party property cyber and third party cyber coverage - Walk through our findings - Discuss first party property cyber coverage s - Risk manager considerations

Cyber Risk Market Research Market maturity curve Current state of cyber insurance market Introductory Growth Maturity Decline

Cyber Risk Market Research Insurance purchases highly dependent on industry Industries with large amounts of personal and financial info purchase insurance at higher frequency Lack of confidence in products offered % of companies purchasing cyber insurance

Overview What is a cyber attack What is covered What is not covered Coverage differentiators

What Is a Cyber Attack Two Broad Categories 1. Introduction of malware (malicious code) a. Virus, spyware, Trojan horses b. Targeted hacking activity 2. Denial-of-Service Attacks

What Is Covered 1. Physical loss or damage to data a. Destruction, distortion or corruption of data, including from a malware event b. Resulting damage to property other than data on an all-risk basis 2. Time element loss resulting from denial-of-service attacks 3. Property damage and time element loss due to cloud or data services interruption

Malware Coverage

Loss or Damage to Data Data, Programs or Software coverage Data is covered property Restoration includes research and engineering Temporary costs to defend against a cyber attack Covered anywhere in policy s territory

Loss or Damage to Data Insured Location Damage to data Covered Resulting damage to other property Covered Cost to repair, replace or restore the data Covered

Loss or Damage to Data Customer or Supplier CTEE Utility - SI Insured Location Service Interruption (SI) loss Covered Third Party Contingent Time Element Extended (CTEE) loss Covered

Loss or Damage to Data Insured Location Data Center Damage to data is covered anywhere in Policy territory Covered

Loss or Damage to Data When data is damaged by malware 48-hour waiting period/time qualifier Monetary deductible

Loss or Damage to Data Loss Example Hacker infiltration over a period of months Wiper malware introduced Data deleted and overwritten Backups destroyed Network down for months

Loss or Damage to Data Typical data loss costs Identify and remediate malware Temporary Repairs to prevent further damage Repair of Data, Programs or Software Expedite permanent repair/replacement of DPS

Loss or Damage to Data Typical data loss costs Temporarily protect/preserve DPS against immediately impending threat Enhancement of security system and hardware

Resulting Damage

Resulting Damage Covered under the base form All-risk coverage under the Insuring Agreement Applies to property other than data Not sublimited to Data, Programs or Software limit Example: attacks on industrial control systems

Resulting Damage Examples: 2014: German Steel Mill 2010: Iranian Uranium Enrichment Plant (the Stuxnet worm)

Resulting Damage The Stuxnet Worm

Denial-of-Service Coverage

Denial-of-Service Coverage Computer Systems Non-Physical Damage coverage TE loss due to failure of system to operate No physical loss or damage required Temporary costs to defend against a cyber attack Trigger: Malicious act directed at Named Insured Insured s electronic data processing equipment or media

Denial-of-Service coverage 48-hour waiting period/time qualifier Monetary deductible

Denial-of-Service Attacks Everyday computers infected Synchronized army of attackers Traffic surge at target website

Denial-of-Service Attacks HACKER REFLECTOR REFLECTOR REFLECTOR REFLECTOR REFLECTOR REFLECTOR REFLECTOR REFLECTOR TARGET

Denial-of-Service Attacks Loss example Severe spike in internet traffic to company websites Overwhelmed network and data center Inaccessible internet services and mobile applications Attack lasted 20 hours

Cloud Coverage

Interruption of Cloud/Data Services Off Premises Data Services coverage Property Damage and Time Element loss Accidental event trigger Coverage applies worldwide Interruption of satellite services included

Interruption of Cloud/Data Services 24-hour waiting period/time qualifier Monetary deductible

Cyber attack Insured Location Property damage Covered Actual loss sustained and Extra Expense Covered Cloud Provider Coverage applies worldwide, including satellites

What s Not Covered

What s Not Covered Third-party liability Compromised data/personal information Consumer notification costs Copying and publishing of proprietary data Media liability Cyber extortion expenses

How does this coverage dovetail with standalone cyber?

If data, programs or software is Property Liability Corrupted Erased Altered/distorted Destroyed Stolen Copied Locked/encrypted where is it covered?

Other possible consequences Property Liability Resulting damage Breach expenses Business interruption Damaged reputation Legal damages Regulatory fines

Risk Manager Considerations Lots of confusion about cyber risk and coverage Clients don t know what they currently have Everyone wants in Increased client requests for risk assessment help Understand what you currently have Determine what you would like to have Treat like property/casualty Look for the broadest coverage in each area

Francis M. Desousa Operations Vice President Senior Business Development Executive 25050 Country Club Blvd. Suite 400 North Olmsted, OH 44070 T: 216-898-4430 C: 703-926-2598 F: 216-362-4825 E: francis.desousa@fmglobal.com