CYBER RISK INSURANCE. Presented By: Jonathan Healy
|
|
- Sarah Chase
- 8 years ago
- Views:
Transcription
1 CYBER RISK INSURANCE Presented By: Jonathan Healy
2 Contents Cyber Risk Threat Sources Cyber events worldwide What is covered by a Cyber Liability policy Risk Identification The gaps in traditional policies Consumer attitude to threats and use of cyber insurance as a means of risk transfer 1
3 Cyber Risk The rapid rise in technology-based innovation has produced business dependencies on information technology systems and has also created a wave of new risks to businesses. Cyber crime, media liabilities as a result of online publishing and a heavy reliance on the uptime of the network are some examples. As a result, there are new business exposures faced by organizations including: Cyber liability to third parties Network security and privacy liability Multimedia liability System damage and business interruption Loss of data are just some of the new liabilities that need to be built into a risk management and risk transfer strategy 2
4 Cyber Risk Cyber Liability to Third Parties By providing IT platforms via a company network, intranet or a website, organizations are exposed to cyber crime activities such as hacking and virus attacks resulting in unauthorised access to their systems. These cyber crimes may result in financial losses to third parties for which an organisation can be held legally liable Network Security and Privacy Liability Organizations that hold customer data or other sensitive information within their networks have a legal obligation to protect and safeguard this information. Businesses who suffer a privacy or security breach which results in the compromise of this data often end up with significant and costly obligations imposed under data protection legislations, regulatory issues and fines and penalties imposed by regulatory bodies. Multimedia Liability By providing content or information via a website, organizations are exposed to many of the same legal issues which apply to traditional publishers, such as infringement of copyright, defamation, infringement of intellectual property rights and invasion of privacy. Business Interruption & Loss of Data Businesses are increasingly totally reliant on the robust functioning of their e-commerce and computer networks. In areas such as online sales, online banking, access to databases and many other internal operations, numerous organizations would be unable to operate without their computer systems 3
5 Cyber Risk Companies faced with cyber risks can be divided into two areas - 1. Those with risk derived from the provision of a Information Technology services 2. Those with risks derived from their dependency on Information Technology services Traditional Errors and Omissions / General Liability and Assets policies have major gaps and exclude the following: Deliberate acts and malicious acts of hackling attacks and virus transmission. Punitive damages or fines and penalties Infringement of Intellectual Property Rights or Defamation (unless specifically extended) Business Interruption or Increase in Cost of Working cover following a virus or hacking attack. Breach of contract 4
6 Defining Cyber Risk By IT standards organisations If we exchange the word cyber for IT, then ISACA The business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise ISO The potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm to the organization. It is measured in terms of a combination of the probability of occurrence of an event and its consequence. Threat Vulnerability Asset Harm September 19,
7 Threat sources Criminal Symantec estimated the direct cost of cyber crime in 24 countries to be US$114 billion: Personal information Credit debit card information Held funds Intellectual property Confidential corporate data Hactivist The world's largest hosting provider of secure websites suffered major outages in September 2012, taking potentially millions of sites down with it. A member associated with the Anonymous collective, claimed responsibility: Public support for a cause Direct impact of core activity Corporate or industry-wide scandal Top corporate brand target 6
8 Threat sources Terrorist Disruption to critical infrastructure Economic impact Loss of life Damage to property State Sponsored In May 2013, it was reported that US intelligence agencies traced the compromise of a national inventory of dams to a foreign government or military operatives, raising concerns of a future attack against the national electrical power grid: Disruption to critical infrastructure Economic impact Loss of life Espionage 7
9 Threat sources Malice After analysing the software code from the Aramco attack, security experts say that the event involved a company insider, or insiders, with privileged access to Aramco s network. The virus could have been carried on a USB memory stick that was inserted into a computer: Disgruntled employee / customer Proof of ability Untargeted malicious code Random selection Negligence Files containing the personal information of more than 6,000 vendors, students and current and former employees at a university were mistakenly made available online during maintenance of a computer. The safeguards that protected the files against public access were accidentally disabled. They were then indexed by Google and were viewable via its search results. Loss of laptop or portable media Virus transmission Insufficient security safeguards 8
10 Cyber events worldwide High profile incidents - Privacy Target data breach: 110M records affected including 40M payment cards. Total costs now stand at $236M with $90M recovered from insurance $148M incurred in the last quarter despite breach occurring December 2013 Ebay data breach: 145M records including names, address and other personal data Subject to investigations by both European regulators and US States -Source: Target Investor Information Class action launched in July. -Source: BBC Technology CyberVors theft: Reported that 420,000 web sites have been compromised 1.2 billion unique user name and password combinations collected 542M addresses collected -Source: The Register 9
11 Cyber events worldwide Ways to lose data Lost/stolen laptop Lost/stolen portable media Lost/stolen backup tapes or disks Theft using authorised access to computer systems Theft by unauthorised intrusion into computer systems Hacking Negligent online disclosure Negligent offline disclosure Negligent disposal of paper or computer assets 10
12 Cyber events worldwide High profile incidents - Outage 2014 setting records for DoS: An Arbor Networks report, found that at the mid-point of 2014, double the number of events over 20Gbps have been reported, as compared to all of Source: Abornetworks.com Largest DoS attack in February 2014 at over 400 Gbps. -Source: Itnews.com.au HSBC, Bank of America, JPMorgan Chase & Co and Citigroup all targeted during 2013 by cyber terrorist organisations with reported links to Iran. Computer glitches a major source of disruption: -Source: Itnews.com.au American Airlines forced to cancel 745 flights last year following a computer glitch. -Source: Wn.com. Long flight delays and cancellations followed problems in connecting to Sabre s reservations system in August 2013, American Airlines, Alaska Airlines, JetBlue, Virgin and Etihad. -Source: NBCnews.com. Accidental deletion of data during maintenance resulted in the unavailability of certain Amazon web services affecting customers including Netflix on Christmas Eve Source: business insider.com 11
13 Cyber events worldwide High profile incidents Physical outcomes In the Marine and Energy sector: Stuxnet virus reportedly destroyed around a fifth of Iran s Nuclear Centrifuges by causing them to spin out of control. -Source: Businessinsider.com Hackers recently shut down a floating oil rig by tilting it, while another rig was so riddled with computer malware that it took 19 days to make it seaworthy again. -Source: Reuters.com Building management systems vulnerable: Cylance security revealed they had been able to hack into the building management system (BMS) of Google's Sydney Wharf 7 office, allowing them to take over the building's air conditioning. They say they have found other major Australian buildings, including hospitals, banks and government departments that are at risk. -Source: abc.net.au 12
14 Cyber events worldwide High profile incidents financial crime ATM withdrawals using fake payment cards Prosecutors believe a group broke into the Bank of Muscat based in Oman in February In the space of 10 hours, casher cells withdrew $40m in 36,000 transactions from ATMs in 24 countries. Source BBC.com Automated attacks using malicious code Operation High Roller in 2012 targeted high balance accounts held by either businesses or well-heeled individuals siphoning off as much as $2.5 billion in an automated attack. Source BBC.com Using stolen payment card information One retail analyst estimated the cost of fraud perpetrated on cards stolen from Target at $1.4 billion - $2.2 billion. Source bizjournals.com 13
15 What is covered by a Cyber Liability policy? 1 by Third-party liability caused data breaches. Data breach incident response costs. Network business interruption. Data recovery and restoration. Cyber extortion. Multimedia liability. 14
16 Risk Identification Potential Risk Event Likelihood Potential Impact Website copyright / trademark infringement claims Low Low Legal liability to others for computer security breaches (non-privacy) Low - Medium Medium - High Legal liability to others for privacy breaches High High Privacy breach notification costs and credit monitoring High Medium - High Privacy regulatory action defense and fines Low Medium Costs to repair damage to your information assets Low Medium Loss of revenue due to a failure of security or computer attack Loss of revenue due to a failure of security at a dependent technology provider Medium (overall) High (e-commerce) Low Medium (overall) High (e-commerce) Medium Cyber extortion threat Low Medium 15
17 Building a risk profile External hack Customer retail website Compromise of personally identifiable information data owner Compromise of commercially sensitive material own Compromise of commercially sensitive material third party Crisis management PR costs Loss of revenue Increased cost of working Litigation cost - defence Third party compensation IT forensic costs Legal fees - advice Breach notification costs Credit monitoring costs Civil regulatory fine Loss of shareholder value September 19,
18 What Are the Gaps in Traditional Policies? Traditional insurance was written for a world that no longer exists. Attempting to fit all of the risks a business faces today into traditional policy is like putting a square peg into a round hole. Errors and Omissions (E&O): even a broadly worded E&O policy is still tied to professional services and often further tied to a requirement that there be an act of negligence Commercial General Liability (CGL): covers only bodily and tangible property - Advertising Injury / Personal Injury (AI/PI) section has potential exclusions/limitations in the area of web advertising Property: courts have consistently held that data isn t property - direct physical loss requirement not satisfied Crime: requires intent and only covers money, securities, and tangible property Kidnap and Ransom (K&R): no coverage without amendment for cyber-extortion 17
19 CYBER RISK SURVEY REPORT UK and Ireland 2014 Using its knowledge and information about the cyber risk in the UK and Ireland, Marsh has undertaken an in-depth study into organisations attitudes towards the threat, the processes they have in place, and their understanding and use of cyber insurance as a means of risk transfer. The benchmarking data in this report was collected from risk professionals and CFOs from large- and medium-sized corporations from across the UK and Ireland. 18
20 Awareness of Cyber Security is growing 19
21 Increased awareness has resulted in cyber risk featuring prominently on organisations corporate risk registers. In total, 82% of survey respondents revealed that the risk features on their corporate risk registers at some point or other; cyber risk is listed in the top ten risks on the corporate risk register of 56% of companies, while 24% place it within the top five. 20
22 Of those organisations that have calculated or estimated the financial impact of a cyber attack, 63% (20% of overall respondents) put the figure at GBP2 million or more. Perhaps one of the most concerning findings to come out of the survey results is that more than two-thirds of organisations have not estimated the financial impact of a cyber breach. 21
23 Organisations are approaching the insurance market 22
24 The insurance market has shown an appetite to cover a range of outcomes arising from a cyber event, with much of the focus on liability and incident response costs connected to breach of personal data, followed by business interruption losses 23
25 When the results reflected in FIGURE 9 are compared with those in FIGURE 1, it would appear that our respondents are following a process towards managing cyber risk. That process begins with developing their organisation s cyber risk profile, understanding the financial impact of a cyber event, before exploring the options for risk transfer in the insurance market. 24
26
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
More informationGALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
More informationTHE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill
THE ANATOMY OF A CYBER POLICY Jamie Monck-Mason & Andrew Hill What s in a name? Lack of uniformity in policies: Cyber Cyber liability Data protection Tech PI The scope of cyber insurance First party coverage
More informationData breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC
Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you
More informationReducing Risk. Raising Expectations. CyberRisk and Professional Liability
Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Are you exposed to CyberRisk? Like nearly every other business, you have likely capitalized on the advancements in technology today
More informationData breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd
Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures
More informationCyber Security Issues - Brief Business Report
Cyber Security: Are You Prepared? This briefing provides a high-level overview of the cyber security issues that businesses should be aware of. You should talk to a lawyer and an IT specialist for a complete
More informationHow To Cover A Data Breach In The European Market
SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to
More informationInsurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
More informationDemystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature
Demystifying Cyber Insurance Jamie Monck-Mason & Andrew Hill Introduction What is cyber? Nomenclature 1 What specific risks does cyber insurance cover? First party risks - losses arising from a data breach
More informationManaging Cyber Risk through Insurance
Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes
More informationJoe A. Ramirez Catherine Crane
RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract
More informationCyber Insurance Presentation
Cyber Insurance Presentation Presentation Outline Introduction General overview of Insurance About us Cyber loss statistics Cyber Insurance product coverage Loss examples Q & A About Us A- Rated reinsurance
More informationCyber/ Network Security. FINEX Global
Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over
More informationSINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry
SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :
More informationAn Introduction to Cyber Liability Insurance. Catherine Berry Senior Underwriter
An Introduction to Cyber Liability Insurance Catherine Berry Senior Underwriter What is cyber risk? Exposures emanating from computer networks and the internet The Cyber Risk Phenomenon The incredible
More informationCYBER RISK SECURITY, NETWORK & PRIVACY
CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread
More informationWhat is Cyber Liability
What is Cyber Liability Ubiquitous Warfare Espionage Media Operational Data Security and Privacy Tech 1 Data Security and Privacy Data Breach Response Costs Privacy Regulatory Action Civil Litigation INSURABLE
More informationISO? ISO? ISO? LTD ISO?
Property NetProtect 360 SM and NetProtect Essential SM Which one is right for your client? Do your clients Use e-mail? Rely on networks, computers and electronic data to conduct business? Browse the Internet
More informationCYBER/ NETWORK SECURITY
CYBER/ NETWORK SECURITY FINEX AUSTRALIA ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over
More informationTen Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
More informationCyber and Data Security. Proposal form
Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which
More informationcyber invasions cyber risk insurance AFP Exchange
Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance
More informationNational Corporate Practice. Cyber risks explained what they are, what they could cost and how to protect against them
National Corporate Practice Cyber risks explained what they are, what they could cost and how to protect against them what this briefing covers ff Introduction ff Section 1: What are the risks and the
More informationPrivacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014
Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014
More informationSecurity & Privacy Current cover and Risk Management Services
Security & Privacy Current cover and Risk Management Services Introduction Technological advancement has enabled greater working flexibility and increased methods of communications. However, new technology
More informationNZI LIABILITY CYBER. Are you protected?
NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is
More informationCyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:
Company or Trading Name: Address: Post Code: Telephone: E-mail: Website: Date Business Established Number of Employees Do you have a Chief Privacy Officer (or Chief Information Officer) who is assigned
More informationCyber Risk: Global Warning? by Cinzia Altomare, Gen Re
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in
More informationCyber Threats: Exposures and Breach Costs
Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals
More informationRogers Insurance Client Presentation
Rogers Insurance Client Presentation Network Security and Privacy Breach Insurance Presented by Matthew Davies Director Professional, Media & Cyber Liability Chubb Insurance Company of Canada mdavies@chubb.com
More informationCyber Risk State of the Art
Proudly presents Cyber Risk State of the Art Matthew Davies, Chubb Insurance Catherine Dowdall, Canada Post Mike Petersen, Marsh 1 Agenda 1. Who is At Risk? 2. New/Emerging Risk and Trends 3. Canada Post
More informationCyber Liability. What School Districts Need to Know
Cyber Liability What School Districts Need to Know Data Breaches Growing In Number Between January 1, 2008 and April 4, 2012 314,216,842 reported records containing sensitive personal information have
More informationIdentifying Cyber Risks and How they Impact Your Business
10 December, 2014 Identifying Cyber Risks and How they Impact Your Business David Bateman, Partner, K&L Gates, Seattle Sasi-Kanth Mallela, Special Counsel, K&L Gates, London Copyright 2013 by K&L Gates
More informationACE European Risk Briefing 2012
#5 ACE European Risk Briefing 2012 IT and cyber risk respondent profiles The research was carried out between 13 April and 3 May 2012. The sample comprised 606 European risk managers, CROs, CFOs, COOs
More informationCyber Liability. AlaHA Annual Meeting 2013
Cyber Liability AlaHA Annual Meeting 2013 Disclaimer We are not providing legal advise. This Presentation is a broad overview of health care cyber loss exposures, the process in the event of loss and coverages
More informationCyber and data Policy wording
Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and
More informationCyber Risks in Italian market
Cyber Risks in Italian market Milano, 01.10.2014 Forum Ri&Assicurativo Gianmarco Capannini Agenda 1 Cyber Risk - USA 2 Cyber Risk Europe experience trends Market size and trends Market size and trends
More informationYOUR TRUSTED PARTNER IN A DIGITAL AGE. A guide to Hiscox Cyber and Data Insurance
YOUR TRUSTED PARTNER IN A DIGITAL AGE A guide to Hiscox Cyber and Data Insurance 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and
More informationProtecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks
Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks Hacks, breaches, stolen data, trade secrets hijacked, privacy violated, ransom demands made; how can you protect your data
More informationCyber-insurance: Understanding Your Risks
Cyber-insurance: Understanding Your Risks Cyber-insurance represents a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some
More informationData Breach and Senior Living Communities May 29, 2015
Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs
More informationCybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
More informationUnderstanding Professional Liability Insurance
Understanding Professional Liability Insurance Definition Professional liability is more commonly known as errors & omissions (E&O) and is a form of liability insurance that helps protect professional
More informationDATA BREACH COVERAGE
THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000
More informationCyber and Privacy Risk What Are the Trends? Is Insurance the Answer?
Minnesota Society for Healthcare Risk Management September 22, 2011 Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Melissa Krasnow, Partner, Dorsey & Whitney, and Certified Information
More informationPrivacy Rights Clearing House
10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights
More informationTHE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
More informationCyber Exposure for Credit Unions
Cyber Exposure for Credit Unions What it is and how to protect yourself L O C K T O N 2 0 1 2 www.lockton.com Add Cyber Title Exposure Here Overview #1 financial risk for Credit Unions Average cost of
More informationRISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION
RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former
More informationAPIP - Cyber Liability Insurance Coverages, Limits, and FAQ
APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP
More informationCoverage is subject to a Deductible
Frank Cowan Company Limited 75 Main Street North, Princeton, ON N0J 1V0 Phone: 519-458-4331 Fax: 519-458-4366 Toll Free: 1-800-265-4000 www.frankcowan.com CYBER RISK INSURANCE DETAILED APPLICATION Notes:
More information4/30/2015 CYBER LIABILITY AND AVIATION AGENDA LEARNING OBJECTIVES. Presented by Hal Hunt May 3, 2015
CYBER LIABILITY AND AVIATION Presented by Hal Hunt May 3, 2015 AGENDA Introduction Leaning Objectives Threat Examples Underwriting Protection/Cyber Policy Summary 2 LEARNING OBJECTIVES Understand Key Terms
More informationInternet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler
Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in
More informationBeyond Data Breach: Cyber Trends and Exposures
Beyond Data Breach: Cyber Trends and Exposures Vietnam 7 th May 2015 Jason Kelly Head of Asia Financial Lines AIG Agenda Why do companies need cyber protection Example of Cyber attack worldwide and in
More informationDATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET
DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET 2014 NSGA Management Conference John Webb Jr., CIC Emery & Webb, Inc. Inga Goddijn, CIPP/US Risk Based Security, Inc. Not just a big business problem
More informationOur specialist insurance services for Professionals risks
Our specialist insurance services for Professionals risks Price Forbes & Partners is an independent Lloyd s broker based in the heart of London s insurance sector. We trade with all of the major international
More informationInsurance implications for Cyber Threats
Lillehammer Energy Claims Conference Lillehammer March 7, 2014 Insurance implications for Cyber Threats How enterprises need to prepare for the inevitable JLT is one of the world s largest providers of
More informationPrivacy and Data Breach Protection Modular application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
More informationCyber Risks and Insurance Solutions Malaysia, November 2013
Cyber Risks and Insurance Solutions Malaysia, November 2013 Dynamic but vulnerable IT environment 2 Cyber risks are many and varied Malicious attacks Cyber theft/cyber fraud Cyber terrorism Cyber warfare
More informationCyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day
Lloyd s of London (Reuters) May 8, 2000 Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Rivers Casino, Pittsburgh November 17, 2014
More informationLost in Cyber Space? Cyber Risks and (Re-) Insurance
Lost in Cyber Space? Cyber Risks and (Re-) Insurance PIU - 10 June 2014 Constanze Brand, Swiss Re Europe S.A., New challenges and innovations in reinsurance PIU - 10 June 2014 Lost in Cyber Space? Cyber
More informationInsuring Innovation. CyberFirst Coverage for Technology Companies
Insuring Innovation. CyberFirst for Technology Companies TECHNOLOGY IS EVERYWHERE. SO ARE THE THREATS. protection that goes well beyond a traditional general liability policy. CyberFirst CyberFirst is
More information3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.
Cybersecurity: Minimizing Risk & Responding to Breaches March 5, 2015 Andy Chambers Michael Kelly Jimmie Pursell Scope of Problem Data Breaches A Daily Phenomenon Anthem JP Morgan / Chase Sony Home Depot
More informationInsurance for Data Breaches in the Hospitality Industry
The Academy of Hospitality Industry Attorneys The Pl Palmer House Hilton Chicago, IL April 25, 2014 Insurance for Data Breaches in the Hospitality Industry Presenters: David P. Bender, Jr. dbender@andersonkill.com
More informationWhat Data? I m A Trucking Company!
What Data? I m A Trucking Company! Presented by: Marc C. Tucker 434 Fayetteville Street, Suite 2800 Raleigh, NC, 27601 919.755.8713 marc.tucker@smithmoorelaw.com Presented by: Rob D. Moseley, Jr. 2 West
More informationUnderstanding the Business Risk
AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 jgold@andersonkill.com Disclaimer The views expressed
More informationCyber and CGL Insurance Coverage for Data Breach Claims
Cyber and CGL Insurance Coverage for Data Breach Claims Paula Weseman Theisen, Partner Data breach overview Definition of data breach/types Data breach costs Data breach legal claims and damages Cyber-insurance
More informationEnterprise PrivaProtector 9.0
IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS
More informationData Breach Cost. Risks, costs and mitigation strategies for data breaches
Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,
More informationDistributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015
Distributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015 Today s Agenda What are we talking about today? What is Risk Evolution of risk management Understand the importance of Risk
More informationCyber-Crime Protection
Cyber-Crime Protection A program of cyber-crime prevention, data breach remedies and data risk liability insurance for houses of worship, camps, schools, denominational/association offices and senior living
More informationEnterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security
Enterprise Security Governance Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security Governance and Organisational Model Risk Mgmt & Reporting Digital Risk & Security
More informationHow-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
More informationCYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014
CYBER LIABILITY Network Security and Privacy Bring on tomorrow May 15, 2014 1 AGENDA I. Identify Exposures II. Identify how a breach can occur III. The Coverage (Third Party Liability + First Party Losses)
More informationDATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE
DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE ACC-Charlotte February 4, 2015 THIS WILL NEVER HAPPEN TO ME! Death, Taxes & Data Breach Not just Home Depot, Target or Sony Do you employ the next
More informationIRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411
IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING
More informationManaging Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec
Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Jeremy Ong Divisional Vice-President Great American Insurance Company November 13, 2010 1 Agenda Overview of data breach statistics
More informationCyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
More informationCyberSecurity for Law Firms
CyberSecurity for Law Firms Cracking the Cyber Code: Recent Headlines, Reinforcing the Need and Response Planning July 16, 2013 Making the Case Matthew Magner Senior Underwriting Officer Chubb & Son, a
More informationCyber Risk in Healthcare AOHC, 3 June 2015
Cyber Risk in Healthcare AOHC, 3 June 2015 Kopiha Nathan, Senior Healthcare Risk Management and Data Specialist James Penafiel, Underwriting Supervisor, Insurance Operations CFPC Conflict of Interest -
More informationCYBER RISK IN AUSTRALIA IS YOUR DATA SAFE? Academy of Risk
CYBER RISK IN AUSTRALIA IS YOUR DATA SAFE? Academy of Risk Contents P1 p2 p4 p7 Introduction CYBER CRIME ON THE RISE IN AUSTRALIA Businesses are taking notice INSURANCE: MAKE SURE YOU ARE COVERED Introduction
More informationDon t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks
Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks Thank you for joining us. We have a great many participants in today s call. Your phone is currently
More informationAirmic Review of Recent Developments in the Cyber Insurance Market. & commentary on the increased availability of cyber insurance products GUIDE
Airmic Review of Recent Developments in the Cyber Insurance Market & commentary on the increased availability of cyber insurance products GUIDE 1. Executive summary Airmic members have become increasingly
More informationCybersecurity Workshop
Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153
More informationHow To Insure Against Cyber Crime
Financial Lines CyberEdge CyberEdge Cyber Risk Protection for Commercial Entities With recent data breaches hitting the headlines across the Asia Pacific/Oceania region, loss of personal and corporate
More informationCyber Insurance Research Paper
Cyber Insurance Research Paper Sponsored by AIG Contents 2 Introduction 3 Legislative Environment 4 Other Jurisdictions 5 Cost of a Data Breach 6 Incident Response 7 What is Cyber Insurance? 8 Who is it
More informationCyber-security: legal implications for financial institutions. IAPP Europe Data Protection Intensive 2013
Cyber-security: legal implications for financial institutions IAPP Europe Data Protection Intensive 2013 Vivienne Artz Managing Director and General Counsel, Citi Cyber threat landscape Kris McConkey Director,
More informationCAGNY Spring 2015 Meeting Fundamentals of Cyber Risk. Brad Gow June 9th, 2015 Endurance
Fundamentals of Cyber Risk Brad Gow June 9th, 2015 Endurance But consider the kickoff chuckle to a speech given to the Wharton School in March 1977 by Sidney Homer of Salomon Brothers, the leading bond
More informationHow not to lose your head in the Cloud: AGIMO guidelines released
How not to lose your head in the Cloud: AGIMO guidelines released 07 December 2011 In brief The Australian Government Information Management Office has released a helpful guide on navigating cloud computing
More informationIs Your Financial Institutions' Insurance Policy vulnerable to a cyber claim? Joan D Ambrosio, James Cooper and Kim West 22 January 2014
Is Your Financial Institutions' Insurance Policy vulnerable to a cyber claim? Joan D Ambrosio, James Cooper and Kim West 22 January 2014 Cyber Exposures Joan D Ambrosio Reported data breaches continue
More informationCyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
More informationMEDIATECH APPLICATION
MEDIATECH APPLICATION FOR PURPOSES OF THE INSURANCE COMPANIES ACT (CANADA), THIS DOCUMENT WAS ISSUED IN THE COURSE OF LLOYD S UNDERWRITERS AND LIBERTY MUTUAL INSURANCE COMPANY S INSURANCE BUSINESSES IN
More informationCyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
More informationWHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
More informationNavigating Cyber Risk Exposure and Insurance. Stephen Wares EMEA Cyber Risk Practice Leader Marsh
Navigating Cyber Risk Exposure and Insurance Stephen Wares EMEA Cyber Risk Practice Leader Marsh Presentation Format Four Key Questions How important is cyber risk and how should we view the cyber threat?
More informationSmall businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning
More informationCYBER SECURITY SPECIALREPORT
CYBER SECURITY SPECIALREPORT 32 The RMA Journal February 2015 Copyright 2015 by RMA INSURANCE IS AN IMPORTANT TOOL IN CYBER RISK MITIGATION Shutterstock, Inc. The time to prepare for a potential cyber
More informationCyber Risk Insurance for Agents. Frequently Asked Questions
Cyber Risk Insurance for Agents Frequently Asked Questions 1 Cyber Risk Insurance About Great American Insurance Great American Insurance Group s roots go back to 1872 with the founding of its flagship
More information