Solving Cyber Risk. Security Metrics and Insurance. Jason Christopher March 2017

Similar documents
NHC Cyber Insurance, Service and Incident Response. 19. oktober 2017

LEGAL IMPLICATIONS FOR THE SHIPPING INDUSTRY

DEBUNKING MYTHS FOR CYBER INSURANCE

Cyber Risk & Insurance

Cyber Silent Exposure in Industrial Property A representative discussion for the entire industry? Simon Dejung

Cyber Risks A Reinsurer s Perspective on Exposure & Claims. EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier

S L tr lo a y t d egy s Cyber -Attack

Cyber a risk on the rise. Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist

Cyber-Insurance: Fraud, Waste or Abuse?

CYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner

HOW TO INSURE CYBER RISKS? Oulu Industry Summit

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

Cyber & Privacy Liability and Technology E&0

LIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE

Mandatory Club Clauses 2018

Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity

An Overview of Cyber Insurance at AIG

Cyber Insurance I don t think it means what you think it means

Cybersecurity Insurance: New Risks and New Challenges

At the Heart of Cyber Risk Mitigation

A GUIDE TO CYBER RISKS COVER

IMO PROVISION OF FINANCIAL SECURITY

Cybersecurity Insurance: The Catalyst We've Been Waiting For

Business/Corporate/Purchasing Liability Waiver Insurance Wording

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage

Cyber Liability A New Must Have Coverage for Your Soccer Organization

Data Breach Financial Protection Program Terms and Conditions

Japanese Government General Indemnity Contract (English translation)

When The Wind Blows: Renewable Energy Risk Management Strategies

Cyber Risks - Engineering Insurers Perspective

Insuring your online world, even when you re offline. Masterpiece Cyber Protection

Cyber Insurance for Lawyers

To renew the County s General Insurance Program for 2018 and consider some optional coverage for increased protection.

Cyber Security Liability:

ARAB WAR RISKS INSURANCE SYNDICATE (AWRIS)

NAIC BLANKS (E) WORKING GROUP

Chubb Cyber Enterprise Risk Management

Does it pay to be cyber-insured

South China Insurance Ship Operator Excess Chassis Liability Clause. Applying to EXCESS PROTECTION AND INDEMNITY

IndustryEdge for technology companies OUR KNOWLEDGE IS YOUR EDGE

FM Global. First-Party Property Cyber Coverage

TERMS AND CONDITIONS OF SERVICE

AUTOMOBILE LIABILITY & PHYSICAL DAMAGE COVERAGE AGREEMENT

Terrorism and Cyber the fast changing landscape it is not just about privacy anymore

NZI LIABILITY CYBER. Are you protected?

Cyber breaches: are you prepared?

Aon Risk Solutions. Global Broking Centre ALPHA AON S GLOBAL TERRORISM & POLITICAL VIOLENCE SOLUTION INTERNATIONAL

Your defence toolkit. How to combat the cyber threat

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them

AUTOMOBILE LIABILITY & PHYSICAL DAMAGE COVERAGE AGREEMENT PART A GENERAL

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP

The working roundtable was conducted through two interdisciplinary panel sessions:

Cyber Risk Mitigation

Warranted not to abandon in case of capture, seizure or detention, until after condemnation of the property insured.

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH

Terrorism Risk and Insurance Markets in 2012

Cybersecurity Privacy and Network Security and Risk Mitigation

Product Liability. Insurance. Beyond every object, there s always a story. Because everything you have, has heart.

HEALTHCARE INDUSTRY SESSION CYBER IND 011

A FRAMEWORK FOR MANAGING CYBER RISK APRIL 2015

Cyber Insurance. How Insuretechs Can Unlock The Opportunity

T A B L E of C O N T E N T S

Property business interruption Policy wording

Cyber Risk Proposal Form

CELLPHONE with QWERTY keyboard. cell phone replacement service. Wireless Communication Equipment Coverage Form ALTERNATIVE MARKETS DIVISION

Product Innovation. Crisis Management. Aon London Global BrokingCentre

1/1/82 INSTITUTE CARGO CLAUSES (AIR) (excluding sendings by Post)

Cyber Liability: New Exposures

Cyber Security & Insurance Solution Karachi, Pakistan

2017 Global Cyber Risk Transfer Comparison Report


Terms and Conditions Cyber Enterprise Risk Management Insurance

Surprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their

Cyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby

Cyber Risks & Insurance

2015 Latin America Cyber Impact Report

Property business interruption (technology) Policy wording

Marine Hull Insurance

australia Canada ireland israel united kingdom United states Rest of world cfcunderwriting.com

The indemnity provided for under this cover is payable if and to the extent that:

Add our expertise to yours Protection from the consequences of cyber risks

IS YOUR CYBER LIABILITY INSURANCE ANY GOOD? A GUIDE FOR BANKS TO EVALUATE THEIR CYBER LIABILITY INSURANCE COVERAGE

Insurance Buyers News

Cyber Risk Management

COMMERCIAL VEHICLE INSURANCE POLICY

Data Breach Program Pricing Companies with revenues less than $1,000,000

Summary of Form Changes e-md /MEDEFENSE Plus Insurance Policy (from version P1818CE-0115 to P1818CE-0716)

2014 The Hartford Steam Boiler Inspection and Insurance Company. All rights reserved.

How to mitigate risks, liabilities and costs of data breach of health information by third parties

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

South China Insurance Institute Mortgagees Interest Wording (Amended 1/2/05)

Self-Defense Liability Coverage Form

SENDINGS INSURANCE I. WARRANTY REGARDING SENDINGS REGISTER II. DECLARATIONS III. CONVEYANCES IV. WARRANTY CLAUSE V. VOYAGES

CYBER LIABILITY REINSURANCE SOLUTIONS

2017 Europe, Middle East & Africa Cyber Risk Transfer Comparison Report

A broker guide to selling cyber insurance. CyberEdge Sales Playbook

CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do

DATA COMPROMISE COVERAGE FORM

Cyber Insurance 2017:

Transcription:

Solving Cyber Risk Security Metrics and Insurance Jason Christopher March 2017

How We Try to Address Cyber Risk What is Cyber Risk? Definitions Who should be concerned? Key categories of cyber risk Cyber Event Scenarios Information theft Property damage Environmental damage Computer systems damage Risk Action Framework Quantifying my unique potential cyber impacts Risk transfer challenges and optimization Effective controls to minimize the risk But how does it really work? Axio 3/21/2017 2

Metrics and Measuring The wild, wild west of cybersecurity We re getting better at this More research than ever before Uncertain evolution of security metrics Lack of data leads to subjectivity and red/yellows/greens

Building a Better Measurement Program Not all measurement is good measurement Compliance can be your friend (yes, I just said that) Metrics, by their nature, will evolve as your data gets better 5

Managing Risk Management Silos everywhere

Tearing Down the Walls Linking security with operations and finance Axio 3/21/2017 7

Elevating Security Metrics Security is not a stoplight! Axio 3/21/2017 8

But It s Still NO ROI Even with new metrics, how do security professionals align with risk as defined by the CFO? What does Mean-Time-to-Fix have to do with quarterly projections? How much less risk will we have after we patch our systems this week? Axio 3/21/2017 9

Quantifying Cyber Exposure Source: Measuring and Managing Information Risk 10

Mapping cyber risk to financial impacts 1 st Party (to your organization) 3 rd Party (to others) Move away from Identify, Protect, Detect, Respond, and Recover and embrace your inner accountant: First and third party damages ICS adds a new component of cyber impact with physical damages This may get mildly uncomfortable Financial Tangible (Physical) Losses Due to Cyber Events (data breaches, destructive attacks, and other unauthorized access or use of your computer systems) can be categorized into these four quadrants. Axio 3/21/2017 11

Data Breach Example Target, by the numbers 40 million credit cards + 70 million customer records stolen $54 million: income to cyber criminals $400 million: cost of replacing credit cards $150 million: Target initial response cost $1 billion: estimated ultimate cost to Target 140: number of active lawsuits against Target 2: Number of C-suite executives at Target who were fired 7: Number of Directors targeted by Institutional Shareholder Services for ouster, claiming failed duties to shareholders Important to watch because of unprecedented impact of Board and C-Suite and record-breaking damages. All data with black-market value is at risk.

Cyber Loss Spectrum 1 st Party (to your organization) Response Costs: forensics, notifications, credit monitoring, crisis management, public relations Legal Expenses: advice and defense This is well-worn territory What hits your budget during an incident? Focuses on mostly non-ics categories like credit monitoring It s easy to get these values Financial Revenue Losses: from network or computer outages, including cloud Cost of Restoring Lost Data Cyber Extortion Expenses Value of Stolen Intellectural Property and associated revenue and market share losses Tangible (Physical) 3 rd Party (to others) 13

1 st Party (to your organization) 3 rd Party (to others) 3 rd Party Entities May Seek to Recover: Consequential Revenue Losses Restoration Expenses Legal Expenses Credit Monitoring Costs Financial Cyber Loss Spectrum What hits your customers or partners when an incident occurs? What do they need to pay for and what are you on the hook to pay them? Tangible (Physical) 14

Stuxnet Aurora BSI Steel Mill <Insert Well Known ICS Security Example Here> 15

Tangible (Physical) Cyber Loss Spectrum 3 rd Party (to others) Financial Quantifying the destruction that may happen during a cybersecurity incident with ICS. This could dwarf the estimates for traditional data breach quantification. Mechanical breakdown of your equipment Destruction or damage to your facilities or other property Environmental cleanup of your property Lost revenues from physical damage to your (or dependent) equipment or facilities (business interruption) Bodily injury to your employees 1 st Party (to your organization) 16

Financial 1 st Party (to your organization) Cyber Loss Spectrum Mechanical breakdown of others equipment Destruction or damage to others or other property Environmental cleanup of others property Bodily injury to others Tangible (Physical) And it would impact your business partners, too, potentially. What would you be liable for? 3 rd Party (to others) 17

A New Metric Emerges Creating a balance sheet of cyber impacts based on extreme, yet plausible scenarios 18

Enter the topic I really want to talk to you about. Axio 3/21/2017 19

Cyber Insurance Timeline 20

Available Insurance 1 st Party (to your organization) Response Costs: forensics, notifications, credit monitoring, crisis management, public relations Legal Expenses: advice and defense Widely Available Cyber Insurance ~60 Insurers Limits of up to $200 Million (or greater with some work Financial Revenue Losses: from network or computer outages, including cloud Cost of Restoring Lost Data Cyber Extortion Expenses 3 rd Party (to others) Specifics vary by carrier: triggers, cloud asset coverage, flexibility in service providers (read the policy) Value of Stolen Intellectual Property and associated revenue and market share losses Unavailable Coverage Tangible (Physical) 21

1 st Party (to your organization) 3 rd Party (to others) 3 rd Party Entities May Seek to Recover: Consequential Revenue Losses Restoration Expenses Legal Expenses Credit Monitoring Costs 3 rd Party Entities may issue or be awarded civil fines and penalties Financial Available Insurance Widely Available Cyber Insurance Subject to caveats on previous page (read your policy) Tangible (Physical) 22

Tangible (Physical) 3 rd Party (to others) Available Insurance Financial Mechanical breakdown of your equipment Excluded from traditional cyber insurance coverage Destruction or damage to your facilities or other property Environmental cleanup of your property Lost revenues from physical damage to your (or dependent) equipment or facilities (business interruption) Bodily injury to your employees 1 st Party (to your organization) 23

Tangible (Physical) Property Insurance 3 rd Party (to others) Financial Coverage under traditional property insurance is uncertain Many policies are silent (litigation risk) Some policies contain complete cyber exclusions (e.g., CL-380) Other policies contain potential exclusions Electronic data Terrorism Read your policy Mechanical breakdown of your equipment Destruction or damage to your facilities or other property Environmental cleanup of your property Lost revenues from physical damage to your (or dependent) equipment or facilities (business interruption) Bodily injury to your employees 1 st Party (to your organization) 24

Tangible (Physical) New Cyber Insurance 3 rd Party (to others) Financial New forms of Cyber Insurance are available to close gaps in property policies affirming coverage Two insurers offer gap-filler coverage Another offers a standalone policy Challenge: lower limits are available than many property programs Mechanical breakdown of your equipment Destruction or damage to your facilities or other property Environmental cleanup of your property Lost revenues from physical damage to your (or dependent) equipment or facilities (business interruption) Bodily injury to your employees 1 st Party (to your organization) 25

1 st Party (to your organization) Available Insurance Financial NEW cyber coverage is available mind the triggers Mechanical breakdown of others equipment Destruction or damage to others or other property Environmental cleanup of others property Bodily injury to others Tangible (Physical) Questionable coverage in traditional casualty policies (similar to property policies) Excluded from traditional cyber insurance coverage 3 rd Party (to others) 26

Re-evaluate your balance sheet Does your insurance cover the impacts you would suffer during an incident? 27

The only control that will actually pay for an incident: Forensics support within 24 hours Lost revenue The only control that will provide exculpability to security managers and CISOs One of the few controls that, once implemented, will get cheaper as your security posture improves Cyber Insurance as an Incentive 28

RISK Cyber Risk Reduction Curve Invest in Technology Invest in Transfer Initial investments should be in cyber capability development controls to protect and sustain As risk curve flattens, cyber insurance becomes an efficient means to further reduce risk Harmonizing the investment in technological and transfer controls requires better risk understanding 1 1 2 2 1 2 Technology Risk Reduction Insurance Risk Reduction CYBERSECURITY CAPABILITY Axio 3/21/2017 29

What s our cyber risk? Are we managing it? 30

Thank You! Jason Christopher Chief Technology Officer jchristopher@axio.com @jdchristopher https://www.linkedin.com/in/jdchristopher + 1 929.575.5774

Additional Materials

CL380 Exclusion Subject only to Clause 1.2 below, in no case shall this insurance cover loss damage liability or expense directly or indirectly caused by or contributed to by or arising from the use or operation, as a means of inflicting harm of any computer, computer system, computer software programme, malicious code, computer virus or process or any other electronic system. Clause 1.2 Where this clause is endorsed on policies covering risks of war, civil war, revolution, rebellion, insurrection, or civil strife arising therefrom, or any hostile act by or against a belligerent power, or terrorism or any person acting from a political motive, Clause 1.1 shall not operate to exclude losses (which would otherwise be covered) arising from the use of any computer, computer system or computer software programme, or any other electronic system, in the launch and/or guidance system, and/or firing mechanism of any weapon or missile. Axio 3/21/2017 33