Data & Cyber Risks. big data

Size: px
Start display at page:

Download "Data & Cyber Risks. big data"

Transcription

1 Data & Cyber Risks big data For all businesses that use or store data V This report highlights the risks of storing or using data and gives business risk managers insight to the exposures, legal ramifications and potential solutions to this growing problem.

2 Introduction The biggest threat to our economy Politicians have signalled that they believe the law needs an overhaul following a recent cyber-attack at telecom firm TalkTalk. Former home office minister Hazel Blears described the TalkTalk data breach as a wake-up call that should prompt a debate about whether further regulation was needed, suggesting cyber crime was probably the biggest threat to our economy. Cyber security and information protection can be challenging for companies of all sizes. Hackers are not the only threat today s businesses rely on the internet for services such as online marketing, administrative functions, credit card processing and distribution controls. Any intrusion that disrupts delivery of these services can lead to brand and reputation damage, regulatory scrutiny, stakeholder dissatisfaction, and financial losses. Contents Data & cyber risks the facts 2 Cyber and data insurance 3 General data protection regulation 5 1 What can a cyber policy insure? 6 Claim scenarios 9 Quotation procedure 11 W Denis can help. We offer a range of risk management and risk transfer solutions that will enable you to assess, manage, and respond effectively to the cyber threats that your organisation faces.

3 Data & cyber risks the facts Data privacy and protection are key cyber risks and related legislation is set to toughen globally. More notifications of, and significant fines for, data breaches can be expected in the future. Legislation has already become much tougher in the US, Hong Kong, Singapore and Australia, while the European Union is looking to agree pan-european data protection rules. Tougher guidelines on a country-bycountry basis can be expected. The risk of business interruption (BI), intellectual property theft and cyberextortion both for financial and non-financial gain are increasing. BI costs could be equal to or even exceed direct losses from a data breach. Attacks by hackers dominate the headlines but there are many gateways through which a business can be impacted by cyber risk. The impact of BI being triggered by technical failure is frequently underestimated compared with cyber-attacks. The vulnerability of industrial control systems (ICS) to attack poses a significant threat. To date, there have been accounts of centrifuges and power plants being manipulated. However, the damage could be much higher from security-sensitive facilities such as nuclear power plants, laboratories, water suppliers or large hospitals. Allianz Risk Pulse Allianz Risk Barometer 2015 Appendix The fourth annual Allianz Risk Barometer was conducted among both global businesses and risk consultants, underwriters, senior managers and claims experts in the corporate insurance segment of both Allianz Global Corporate & Specialty (AGCS) and local Allianz entities. Figures represent the number of responses as a percentage of all survey responses (709). More than one risk could be selected by respondents. Top Business Risks Rank Trend 1 Business interruption and supply chain 46% 1 (43%) - 2 Natural catastrophes 30% 2 (33%) - 3 Fire/explosion 27% 3 (24%) - 4 Changes in legislation and regulation 18% 4 (21%) - 5 Cyber crime, IT failures, espionage, data breaches 17% 8 (12%) 6 Loss of reputation or brand value (e.g. from social media) 16% 6 (15%) - 7 Market stagnation or decline 15% 5 (19%) 8 Intensified competition 13% 7 (14%) 9 Political/social upheaval, war 11% 18 (4%) 10 Theft, fraud, corruption 9% 9 (10%) 11 Quality deficiencies, serial defects 8% 10 (10%) 12 Market fluctuations (e.g. foreign exchange rates or interest rates) 7% 11 (8%) 13 Talent shortage, aging workforce 7% 16 (6%) 14 Commodity price increases 6% 13 (7%) 15 Climate change/increasing volatility of weather 6% 23 (3%) 16 Credit availability 6% 15 (6%) 17 Austerity programs 5% 12 (7%) 18 Pollution 4% 17 (5%) 19 Technological innovation (e.g 3D printing, nanotechnology) 3% 14 (7%) 20 Terrorism 3% 22 (3%) 21 Inflation 3% 24 (2%) 22 Power blackouts 2% 19 (3%) 23 Health issues (e.g. pandemics) 2% 20 (3%) 24 Protectionism 2% 25 (1%) 25 Euro-zone disintegration 2% 21 (3%) 26 Deflation 1% 26 (1%) - Cyber and data insurance is needed by any company which possesses or uses data, the internet and telephone systems. 2

4 Cyber & data insurance The facts We don t need it as we re not a technology company Wrong Cyber & data insurance is needed by any company which possesses or uses data, the internet and telephone systems. Premiums can be expensive Wrong For small businesses the premiums start from 100 per year plus tax. We don t need it as we don t trade over the internet Wrong Cover can insure a range of exposures including fraudulent billing (e.g. fraudsters purporting to be your supplier and hacking systems/information in order to deceive your staff into settling invoices to bogus accounts). Cover is limited Wrong Options can be available for a pre-set` range of covers or alternatively, particularly for larger companies, bespoke policies can be arranged. Cyber insurance has evolved over the last 10 years and a wide range of exposures can now be insured, which previously were uninsurable. In the UK limits sought are usually in the 5 million to 10 million range. With excess layer support limits up to 100 million and higher being available in the London market. For businesses with USA exposures, higher limits are more common due to the more onerous data protection laws in America. Insurers are already providing capacity to fulfil the requirements of companies in the USA, which at the upper end are buying cyber limits in the $200 million to $300 million range. Cyber crime is over-rated Wrong The costs to the UK economy alone are huge, with a recent estimate in excess of $4.3 billion per annum. This includes: intellectual property theft industrial espionage extortion costs direct online theft costs theft of customer data The annual global cost of cyber crime is estimated in the region of $250 billion across the world s 10 largest economies. Continued... 3

5 Cyber & data insurance How much does cyber-crime cost the world s leading 10 economies? This AGCS atlas examines the estimated total cost to the global economy from cyber-crime per year, with a particular focus on the impact on the world s top 10 economies, according to GDP. 1. US $108bn Since 2005 there have been 5,029 reported data breach incidents in the US, where organisations must report data breaches to regulators, involving more than 675 million estimated records, according to the Identity Theft Resource Center. 2. China $60bn 3. Germany $59bn 4. Brazil $7.7bn 5. UK $4.3bn 6. India $4bn 7. France $3bn 8. Russia $2bn 9. Japan $980m 10. Italy $900m Country Ranking by GDP1 $445bn1 annual cost to the global economy 1 CSIS/McAfee $250bn cost of cyber-crime to world s 10 leading economies Cyber-crime as a % of GDP2 $200bn+ annual cost to top four economies 50%+ top 10 economies share of annual cost Estimated cost3 1. US $16.8trn.64% $108bn 2. China $9.5trn.63% $60bn 3. Japan $4.9trn.02% $980m 4. Germany $3.7trn 1.60% $59bn 5. France $2.8trn.11% $3bn 6. UK $2.7trn.16% $4.3bn 7. Brazil $2.4trn.32% $7.7bn 8. Russia $2.1trn.10% $2bn 9. Italy $2.1trn.04% $900m 10. India $1.9trn.21% $4bn Sources: 1 World Bank (2013) 2 Net Losses: Estimating the Global Cost of Cyber-Crime, CSIS/McAfee 3 Allianz Global Corporate & Speciality. Rankings according to cyber-crime costs Statistics outside the US are patchy. However, there have been at least 200 breaches in Europe involving 227 million records since 2005, according to an estimate by the Center for Media, Data and Society at the Central European University. Some of the largest breaches include the likes of US retailers Target and Home Depot, health insurer Anthem, entertainment and electronics firm Sony and investment bank JP Morgan Chase. The Target data breach in 2014, in which the personal details of some 70 million people may have been compromised, was one of the largest in history. It has been reported that it has cost the company well in excess of $100m, not including the damage to their reputation and loss of business, and was followed by the company s chief executive leaving his post. Few insurers provide cyber cover Wrong There is a growing insurance market that is responding to demand. A range of insurers are aiming to write cyber insurance for small business (under 10m turnover). Several insurers are active in the mid-market. At the high end, a new consortium of underwriters recently launched a facility in London to insure global businesses (with revenue exceeding $5 billion) cyber exposures. There is no legal or regulatory requirement for cyber insurance so I don t need it Wrong Governments are reviewing the growing problem of data theft and cyber crime. See next page regarding EU General Data Protection Regulations. 4

6 General data protection regulation The European Union is working on new legislation that could have serious ramifications. It is intended to be a wide cast net and will apply to any data controller which is summarised as follows: Data controllers and processors to implement appropriate measures to ensure a level of security appropriate to the risk presented and the nature of personal data protected To notify the supervising authority without undue delay and where feasible not later than 24 hours after becoming aware of a personal data breach Data subjects have the right to have data erased where no longer considered necessary in the purpose for which it was collected Provides for private rights of action for damage suffered as a result of unlawful processing of data or an action inconsistent with the regulation These new EU regulations are expected to be finalised in the latter part of Penalties the current proposals set out a three-tiered system, with the most serious breaches resulting in fines of up to 1m ($1.1m) or 2% of worldwide annual turnover. Compensation may also be payable to individual(s) who have suffered loss as a result of any data breach. In the USA there are already strict regulations and penalties related to the management of data. The Personal Data Protection Act (PDPA), introduced in 2014, is the first privacy- specific legislation in Singapore, and aims to provide transparency in relation to the use of individuals personal data. PDPA investigations are now underway following unrelated breaches at a telecoms company and a karaoke company, in which customers personal data was accessed and/or leaked by hackers. The PDPA introduced fines of up to $1m per breach. In Australia, a number of high profile cyber breaches, coupled with an estimated 20% increase in cyber-attacks on businesses in 2014, have led to the Australian Privacy Commissioner and other regulatory authorities including Australian Prudential Regulation Authority (APRA) and the Australian Securities and Investments Commission (ASIC) focusing on the regulation of personal information and security of online business platforms. Legislation requiring mandatory reporting of serious data breaches is likely to be enacted in the next year, and thereafter increased levels of reported breaches and fallout regulatory sanction are expected. 5

7 What can a cyber policy insure? Potential risk scenarios from cyber attacks or incidents Critical data is lost Customers may be lost and business interrupted Property damage Theft Adverse media coverage/damage to reputation/ lower market share - 71% of customers said they would leave an organisation after a data breach Regulatory actions and associated fines and penalties Profits impacted/value of shares may fall Loss of trade secrets/confidential information Extortion Breach of contract Product recall Notification costs and other response costs i.e. forensic Network security liability Directors and officers liability The annual global cost of cyber crime is estimated in the region of $250 billion across the world s 10 largest economies. 6

8 What can a cyber policy insure? Cyber in the context of insurance is an umbrella term embracing any risk faced by a business through its use of online networks or systems. Those risks can include denial of networks and systems by natural phenomena, electronic phenomena (e.g. viruses) and humans; and data lost through error or theft; damage to stock through hackers accessing internet-based control systems; internet/telephony fraud, extortion and associated reputational and legal liabilities. First Party Third Party Cyber loss or damage Restoration of the insured s network and data following unauthorised access, computer virus, denial of service attack or operational error. Cyber media liability Defamation and disparagement. Infringement of copyright, trademark and publicity rights. Adulteration and contamination of stock Stock damage cover if goods are stored in a temperature controlled environment as a result of unauthorised access, computer virus or a denial of service attack to the insured s network. Privacy liability Violation of a person s rights of privacy or publicity - administrative or regulatory proceedings. Disclosure of non-public personal information. Failure to provide notice of a potential disclosure either which was originally stored on the insured s network or a third party custodian s (e.g. cloud provider). Business interruption or extra expense Loss of income or extra expense following unauthorised access, operational error, computer virus or denial of service attack to the insured s network. Breach of confidentiality Disclosure of corporate confidential information or trade secrets. Failure to provide notice of a potential disclosure either which was originally stored on the insured s network or a third party custodian s (e.g. cloud provider). Cyber theft Loss or alteration to the insured s money, security (for instance an internet driven phishing scam of the insured s network) Loss of the insured s goods due to unauthorised delivery of goods All due to transmission of information through or to the insured s network and created by an external source. Cyber security liability Inability of others to access insured network. Damage to third party networks. Loss of or damage to third party data on the insured s network. Continued... 7

9 What can a cyber policy insure? First Party Third Party Cyber extortion Loss or alteration to the insured s money, security (for instance an internet driven phishing scam of the insured s network). Loss of the insured s goods due to unauthorised delivery of goods All due to transmission of information through or to the insured s network and created by an external source. Defacement of the insured s website. Breach of payment security liability The insured s legal liability to pay damages in respect of a breach of a written contract between the insured and any entity or individual that governs the storage and processing of credit card information, including any breach of the PCI DSS (Payment Card Industry Data Security Standard). Telephone hacking Forensic investigation costs arising from the use of the insured s bandwidth and the cost of unauthorised calls due to unauthorised access of the insured s telephone system by an external source. Privacy liability Legal liability to pay regulatory compensation awards, civil penalties or fines (only where permitted by law) and the regulatory defence costs in connection with an investigation, defence or appear of any investigation following a covered claim on the above third party liability cyber liability insuring clauses. Crisis management costs and notification costs Regardless of it being a first or third party event, when a cyber or network incident occurs it can have a devastating effect on the reputation of the company and the confidence of its customers. This part of the policy provides funds, in the event of an incident, to enable the insured to hire expert assistance to mitigate the effect of the incident. In the event of a data breach the cost of notification of that breach to all relevant parties will also be covered. Not all of the above covers are provided on every cyber policy. If you require certain level of specific cover, a bespoke cyber policy may suit you best. Please speak to W Denis Insurance Brokers PLC so that your requirements can be evaluated and understood. Usually a First Party Event will very quickly also turn into a Third Party Event, if there is a breach of your security and a potential loss or exposure of data to hackers, your own losses will swiftly manifest into a legal liability when you have to report data breach to your customers. Some of the cyber insurance policies we arrange include First Notification of Loss` 24/7 telephone helplines. Immediately following a potential claim, with one phone call you can contact our dedicated specialists who will assist with technical support, public relations advice, data retrieval or loss assistance. This includes IT forensic support to help with identifying the cause of the breach, enabling secure systems to be reinstated and minimise any potential loss or legal liability. 8

10 Claim scenarios European Court of Justice ruling on Weltimmo, Hungary The ECJ ruled in favour of the Hungarian data protection authority in its case against Slovakian property site Weltimmo. It s a landmark ruling that could have big implications for companies such as Facebook and Google, operating across multiple EU countries. The ECJ ruled on the 30th September 2015 that if a company operates a service in the native language of a country, and has representatives in that country, then it can be held accountable by the country s national data protection agency, despite not being headquartered in that country. The ruling means that Weltimmo could be liable for 10m Hungarian forint ( 23,650) fine levied by the Hungarian authority over the passing of user information to debt collection agencies, which was found to infringe Hungarian data protection laws. Airline In June 2015, hackers grounded 10 planes belonging to a Polish airline after a denial of access attack blocked the sending of flight plans. Oil Producer In 2012, malware disabled tens of thousands of computers at oil company Saudi Aramco, disrupting operations for a week. Industrial Control Systems examples Recent years have seen growing concern about the vulnerability of industrial control systems (ICS), which are used to monitor or control processes in industrial and manufacturing sectors, for example. An attack against an ICS could result in physical damage, such as a fire or explosion, as well as business interruption. A number of ICS still used by manufacturing and utilities companies today were designed at a time before cyber security became a priority issue. Vulnerability of ICS was first highlighted by the Stuxnet computer worm in Stuxnet was reportedly developed by Israel to target Iranian nuclear facilities the worm allegedly destroyed uranium enrichment centrifuges. ICS are also vulnerable to both technical failure and operator error as well, which can be much more frequent and severe in terms of impact and are often not captured in cyber reports. While ICS are a particular issue for the energy sector, similar cyber-related physical damage and business interruption risks exist in other industries. For example, car manufacturing plants rely on robots to make and assemble vehicles. Should a robot be hacked or suffer a technical fault, a production line could be interrupted for hours or days, at a potential cost of tens of millions of dollars per day. Continued... 9

11 Claim scenarios And the potential cost of damages could be even higher from an incident involving security-sensitive facilities such as nuclear power plants, laboratories, water suppliers or large hospitals. A hacker caused a floating oil-platform located off the coast of Africa to tilt to one side, thus forcing it to temporarily shut down. Somali pirates employed hackers to infiltrate a shipping company s systems to identify vessels passing through the Gulf of Aden with valuable cargoes and minimal on-board security. This led to the hijacking of at least one vessel. Denial of service attacks (initiating a very high number of requests to a system to cause it to cease operating) against ports have been reported. Furthermore, there have been a number of anecdotal accounts about hackers accessing computer systems/navigation software, subsequently causing hull damage. Boris Berezovsky vs Roman Abramovich In this major struggle between two Russian oligarchs`, in the UK High Court a hacker allegedly hacked into and obtained confidential information from Boris Berezovsky s lawyers and offered it to Roman Abramovich. Judgement was recently given in Abramovich s favour, awarding him $6.5billion the biggest private court case in British legal history. This incident demonstrates how exposed law firms are to cyber risks. Epsilon Data Management Epsilon Data managed communication for large companies such as Marks & Spencer and JP Morgan Chase. Hackers stole an estimated 60 million addresses. The resulting losses, including forensic audits, fines, litigation and lost business are estimated at $4billion. Zurich American Insurance Co vs Sony Corp Zurich filed a suit against Sony in New York state court seeking a declaration that it is not obliged to defend Sony against three separate breaches of Sony s Playstation Network, in which 100million customer records were exposed. The alleged damages are at $171million. 10

12 Claim scenarios Online retailer Case Study: Website hosting failure Impact: Website downtime resulting in lost sales and revenue. Consequence: When equipment failed at the data centre hosting the retailer s website, the online sales function was unable to accept or process orders. Policy response: Covered the loss of income from the loss of sales. Hotel Case Study: Back-end system failure Impact: Without information to process customers, hotel reception became chaotic, incorrect bills were issued, income was impaired and business was lost. Consequence: Check-in/check-out, billing, room management and staff coordination information became out of date and thus of no use. Policy response: The hotel lacked cyber cover but would have been provided with insurance against lost revenue and funded with the increased cost of working. Clothing distribution firm Case Study: Stock control system malfunction Impact: Disruption of the distribution routine had a disproportionate impact on popular sizes, resulting in a dramatic reduction in sales. Consequence: Programming error resulted in the distribution to stores of a limited range of garment sizes. Policy response: Covered the loss of income from the loss of sales. Engineering firm Case Study: Breach of commercial confidentiality Impact: As part of a tender for business, a supplier sent its price list to the policyholder, an engineering firm. This list was subsequently forwarded, inadvertently, to a rival of the original supplier. Once in the possession of the list, the competitor was able to undercut the supplier s prices in order to win business. The supplier therefore brought legal proceedings for loss of future earnings against the engineering firm. Consequence: Legal action by a supplier. Policy response: Covered the policyholder s legal expenses and the cost of the settlement. Continued... 11

13 Claim scenarios Charity Case Study: Website failure Consequence: The charity relies heavily on donations made via its website, with the level of donations fluctuating according to the season, such as Christmas, or in connection with a sponsored event or advertising campaign. The website failure coincided with such an activity, severely compromising fund-raising activity and thus hindering its viability in terms of fulfilling its charitable aspirations and responsibilities. Impact: Inability to accept online donations. Policy response: Covered cost of forensic investigation work into the cause of the failure and met restoration costs in full. It also covered the charity for its loss of income and increased cost of working. Retail clothing chain Case Study: Stock control system failure Consequences: Point-of-sale equipment stopped working. Unable to accept orders via website. Impact: Collapse of auto-ordering via point-of-sale tills resulted in popular items running short, with immediate and substantial negative effect on sales and ultimately, reputation. Policy response: Funded cost of forensic investigation into cause of failure; Funded network restoration costs; Compensation for lost revenue; Funded increased cost of working from manual updating of stock system following full stock-take. 12

14 Quotation procedure For small businesses (turnover under 15m) we can offer very fast premium/cover indications on a statement of fact` basis. However the cover provided via this method is not the widest and is quite rigid. If you would like a bespoke quotation, where the widest cover and highest limits are available, or if your turnover exceeds 15m then we will need to ask you to complete a short application form, before we can offer you a quotation. W Denis Insurance Brokers PLC Brigade House, 86 Kirkstall Road, Leeds LS3 1LQ T and 34 Lime Street, London, EC3M 7AT T Authorised and Regulated by the Financial Conduct Authority 13 DISCLAIMER: The information, examples and suggestions in this document have been procured from sourced believed to be reliable, but they should not be construed as legal or other professional advice. W Denis Insurance Brokers PLC accepts no responsibility for the accuracy or completeness of this material. This material is for illustrative purposes and is not intended to constitute a contract. Please remember that only the relevant insurance policy can provide the actual terms, coverages, conditions, amounts, terms and exclusions that will apply. All products and services outlined in this document may not be available in all worldwide jurisdictions or US states and may be subject to change without notice. W Denis Insurance Brokers PLC will provide a specific quotation for your consideration, on request, which will include contract certain terms and conditions applicable to you.

Top Business Risks 2015

Top Business Risks 2015 Allianz Risk Pulse Allianz Risk Barometer 2015 Appendix Top Business Risks 2015 The fourth annual Allianz Risk Barometer was conducted among both global businesses and risk consultants, underwriters, senior

More information

Top Business Risks 2016

Top Business Risks 2016 Allianz Risk Pulse Allianz Risk Barometer 2016 Appendix Top Business Risks 2016 The fifth annual Allianz Risk Barometer was conducted among both global businesses and risk consultants, underwriters, senior

More information

How To Cover A Data Breach In The European Market

How To Cover A Data Breach In The European Market SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to

More information

Cyber/ Network Security. FINEX Global

Cyber/ Network Security. FINEX Global Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over

More information

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures

More information

Insurance implications for Cyber Threats

Insurance implications for Cyber Threats Lillehammer Energy Claims Conference Lillehammer March 7, 2014 Insurance implications for Cyber Threats How enterprises need to prepare for the inevitable JLT is one of the world s largest providers of

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

Cybercrime: risks, penalties and prevention

Cybercrime: risks, penalties and prevention Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

More information

CYBER RISK SECURITY, NETWORK & PRIVACY

CYBER RISK SECURITY, NETWORK & PRIVACY CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread

More information

Cyber and data Policy wording

Cyber and data Policy wording Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and

More information

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature Demystifying Cyber Insurance Jamie Monck-Mason & Andrew Hill Introduction What is cyber? Nomenclature 1 What specific risks does cyber insurance cover? First party risks - losses arising from a data breach

More information

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you

More information

ACE European Risk Briefing 2012

ACE European Risk Briefing 2012 #5 ACE European Risk Briefing 2012 IT and cyber risk respondent profiles The research was carried out between 13 April and 3 May 2012. The sample comprised 606 European risk managers, CROs, CFOs, COOs

More information

Cyber and Data Security. Proposal form

Cyber and Data Security. Proposal form Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which

More information

Managing Cyber Risk through Insurance

Managing Cyber Risk through Insurance Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes

More information

A Guide to Cyber Risk

A Guide to Cyber Risk Allianz Global Corporate & Specialty A Guide to Cyber Risk Managing the Impact of Increasing Interconnectivity Scope of the Report Scope of the Report Cyber risk is now a major threat to businesses. Companies

More information

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President

More information

NZI LIABILITY CYBER. Are you protected?

NZI LIABILITY CYBER. Are you protected? NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is

More information

CAGNY Spring 2015 Meeting Fundamentals of Cyber Risk. Brad Gow June 9th, 2015 Endurance

CAGNY Spring 2015 Meeting Fundamentals of Cyber Risk. Brad Gow June 9th, 2015 Endurance Fundamentals of Cyber Risk Brad Gow June 9th, 2015 Endurance But consider the kickoff chuckle to a speech given to the Wharton School in March 1977 by Sidney Homer of Salomon Brothers, the leading bond

More information

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :

More information

Cyber Insurance as one element of the Cyber risk management strategy

Cyber Insurance as one element of the Cyber risk management strategy Cyber Insurance as one element of the Cyber risk management strategy Stéphane Hurtaud Partner Governance, Risk & Compliance Thierry Flamand Partner Insurance Leader Laurent de la Vaissière Director Governance,

More information

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in

More information

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014

More information

Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015

Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015 Maritime Insurance Cyber Security Framing the Exposure Tony Cowie May 2015 Table of Contents / Agenda What is cyber risk? Exposures - Should we be concerned about "Cyber"? Is Cyber covered under a Marine

More information

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Are you exposed to CyberRisk? Like nearly every other business, you have likely capitalized on the advancements in technology today

More information

How To Protect Your Data From Hackers

How To Protect Your Data From Hackers Cyber Risk: What you need to know and what you can t afford to ignore! James Johnston Directors' and Officers' Insurance Underwriter Daniel Fletcher Cyber Insurance Underwriter Financial & Specialty Markets

More information

www.bonddickinson.com Cyber Risks October 2014 2

www.bonddickinson.com Cyber Risks October 2014 2 www.bonddickinson.com Cyber Risks October 2014 2 Why this emerging sector matters Justin Tivey Legal Director T: +44(0)845 415 8128 E: justin.tivey The government estimates that the current cost of cyber-crime

More information

Airmic Review of Recent Developments in the Cyber Insurance Market. & commentary on the increased availability of cyber insurance products GUIDE

Airmic Review of Recent Developments in the Cyber Insurance Market. & commentary on the increased availability of cyber insurance products GUIDE Airmic Review of Recent Developments in the Cyber Insurance Market & commentary on the increased availability of cyber insurance products GUIDE 1. Executive summary Airmic members have become increasingly

More information

Cyber Insurance Presentation

Cyber Insurance Presentation Cyber Insurance Presentation Presentation Outline Introduction General overview of Insurance About us Cyber loss statistics Cyber Insurance product coverage Loss examples Q & A About Us A- Rated reinsurance

More information

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in

More information

An Introduction to Cyber Liability Insurance. Catherine Berry Senior Underwriter

An Introduction to Cyber Liability Insurance. Catherine Berry Senior Underwriter An Introduction to Cyber Liability Insurance Catherine Berry Senior Underwriter What is cyber risk? Exposures emanating from computer networks and the internet The Cyber Risk Phenomenon The incredible

More information

CYBER/ NETWORK SECURITY

CYBER/ NETWORK SECURITY CYBER/ NETWORK SECURITY FINEX AUSTRALIA ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

The potential legal consequences of a personal data breach

The potential legal consequences of a personal data breach The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.

More information

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former

More information

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection Page 1 of 5 Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such an alarming rate and business is more and more reliant on IT

More information

YOUR TRUSTED PARTNER IN A DIGITAL AGE. A guide to Hiscox Cyber and Data Insurance

YOUR TRUSTED PARTNER IN A DIGITAL AGE. A guide to Hiscox Cyber and Data Insurance YOUR TRUSTED PARTNER IN A DIGITAL AGE A guide to Hiscox Cyber and Data Insurance 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and

More information

Care Providers Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management

Care Providers Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management Care Providers Protecting your organisation, supporting its success Risk Management Insurance Employee Benefits Investment Management Care providers are there to help those in need. But who helps the care

More information

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection Page 1 of 5 Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such an alarming rate and business is more and more reliant on IT

More information

Security & Privacy Current cover and Risk Management Services

Security & Privacy Current cover and Risk Management Services Security & Privacy Current cover and Risk Management Services Introduction Technological advancement has enabled greater working flexibility and increased methods of communications. However, new technology

More information

National Corporate Practice. Cyber risks explained what they are, what they could cost and how to protect against them

National Corporate Practice. Cyber risks explained what they are, what they could cost and how to protect against them National Corporate Practice Cyber risks explained what they are, what they could cost and how to protect against them what this briefing covers ff Introduction ff Section 1: What are the risks and the

More information

Charities & Not for Profit Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management

Charities & Not for Profit Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management Charities & Not for Profit Protecting your organisation, supporting its success Risk Management Insurance Employee Benefits Investment Management Charities are there to help those in need. But who helps

More information

Our specialist insurance services for Professionals risks

Our specialist insurance services for Professionals risks Our specialist insurance services for Professionals risks Price Forbes & Partners is an independent Lloyd s broker based in the heart of London s insurance sector. We trade with all of the major international

More information

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system

More information

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become

More information

HCC International Information and Communication Technology

HCC International Information and Communication Technology HCC International Information and Communication Technology The Growth and Evolution of the ICT Market The Information and Communication Technology (ICT) sector remains one of the fastest growing, most

More information

Insuring Innovation. CyberFirst Coverage for Technology Companies

Insuring Innovation. CyberFirst Coverage for Technology Companies Insuring Innovation. CyberFirst for Technology Companies TECHNOLOGY IS EVERYWHERE. SO ARE THE THREATS. protection that goes well beyond a traditional general liability policy. CyberFirst CyberFirst is

More information

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION In the ever-evolving technological landscape which we all inhabit, our lives are dominated by

More information

Allianz Risk Barometer on Business Risks 2014

Allianz Risk Barometer on Business Risks 2014 January 2014 Allianz Risk Pulse Allianz Risk Barometer on Business Risks 2014 The rise of interconnected risks Business interruption, natural catastrophes and fire top risks for companies in 2014, Allianz

More information

Allianz Global Corporate & Specialty. Cyber Risks. Recent Trends. AIRMIC 15 th June 2015

Allianz Global Corporate & Specialty. Cyber Risks. Recent Trends. AIRMIC 15 th June 2015 Allianz Global Corporate & Specialty Cyber Risks Recent Trends AIRMIC 15 th June 2015 Copyright Allianz Global Corporate & Specialty 2014 1 Copyright Allianz Global Corporate & Specialty 2014 2 Allianz

More information

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone: Company or Trading Name: Address: Post Code: Telephone: E-mail: Website: Date Business Established Number of Employees Do you have a Chief Privacy Officer (or Chief Information Officer) who is assigned

More information

Cyber Risks in Italian market

Cyber Risks in Italian market Cyber Risks in Italian market Milano, 01.10.2014 Forum Ri&Assicurativo Gianmarco Capannini Agenda 1 Cyber Risk - USA 2 Cyber Risk Europe experience trends Market size and trends Market size and trends

More information

Cyber Threats and the Insurance Response

Cyber Threats and the Insurance Response Cyber Threats and the Insurance Response Scott Reeves & Laurence Yan Munich Reinsurance Company This presentation has been prepared for the Actuaries Institute 2014 General Insurance Seminar. The Institute

More information

ISO? ISO? ISO? LTD ISO?

ISO? ISO? ISO? LTD ISO? Property NetProtect 360 SM and NetProtect Essential SM Which one is right for your client? Do your clients Use e-mail? Rely on networks, computers and electronic data to conduct business? Browse the Internet

More information

THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill

THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill THE ANATOMY OF A CYBER POLICY Jamie Monck-Mason & Andrew Hill What s in a name? Lack of uniformity in policies: Cyber Cyber liability Data protection Tech PI The scope of cyber insurance First party coverage

More information

cyber invasions cyber risk insurance AFP Exchange

cyber invasions cyber risk insurance AFP Exchange Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance

More information

ASSOCIATION LIABILITY Broker Information. innovative insurance protection

ASSOCIATION LIABILITY Broker Information. innovative insurance protection ASSOCIATION LIABILITY Broker Information innovative insurance protection BROKER HIGHLIGHTS We Know Non-Profits: Through our strong links with the social service and community sector Rosser Underwriting

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

What is Cyber Liability

What is Cyber Liability What is Cyber Liability Ubiquitous Warfare Espionage Media Operational Data Security and Privacy Tech 1 Data Security and Privacy Data Breach Response Costs Privacy Regulatory Action Civil Litigation INSURABLE

More information

Airmic review of the supply chain insurance market Review of recent developments in the supply chain insurance market

Airmic review of the supply chain insurance market Review of recent developments in the supply chain insurance market REPORT Airmic review of the supply chain insurance market Review of recent developments in the supply chain insurance market 1. Executive summary Increasingly complex supply chains, together with greater

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

MANAGING DIGITAL RISKS IN THE RETAIL WORLD

MANAGING DIGITAL RISKS IN THE RETAIL WORLD Risk Insight WILLIS RETAIL PRACTICE MANAGING DIGITAL RISKS IN THE RETAIL WORLD The retail sector has been revolutionised by developments in the digital world, opening up a whole new way to access consumers

More information

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.

More information

CYBER RISK INSURANCE. Presented By: Jonathan Healy

CYBER RISK INSURANCE. Presented By: Jonathan Healy CYBER RISK INSURANCE Presented By: Jonathan Healy Contents Cyber Risk Threat Sources Cyber events worldwide What is covered by a Cyber Liability policy Risk Identification The gaps in traditional policies

More information

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP

More information

ENSURING SECURITY IN AND FACILITATING INTERNATIONAL TRADE. Measures toward enhancing maritime cybersecurity. Submitted by Canada SUMMARY

ENSURING SECURITY IN AND FACILITATING INTERNATIONAL TRADE. Measures toward enhancing maritime cybersecurity. Submitted by Canada SUMMARY E FACILITATION COMMITTEE 39th session Agenda item 7 FAL 39/7 10 July 2014 Original: ENGLISH ENSURING SECURITY IN AND FACILITATING INTERNATIONAL TRADE Measures toward enhancing maritime cybersecurity Submitted

More information

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison Gary Solway* Bennett Jones LLP The August release of the purported names and other details of over 35 million customers

More information

INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES

INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES NOTICE: INSURING AGREEMENTS I.A., I.C. AND I.D. OF THIS POLICY PROVIDE COVERAGE ON A CLAIMS MADE AND REPORTED BASIS AND APPLY ONLY

More information

Is Your Financial Institutions' Insurance Policy vulnerable to a cyber claim? Joan D Ambrosio, James Cooper and Kim West 22 January 2014

Is Your Financial Institutions' Insurance Policy vulnerable to a cyber claim? Joan D Ambrosio, James Cooper and Kim West 22 January 2014 Is Your Financial Institutions' Insurance Policy vulnerable to a cyber claim? Joan D Ambrosio, James Cooper and Kim West 22 January 2014 Cyber Exposures Joan D Ambrosio Reported data breaches continue

More information

Beyond Data Breach: Cyber Trends and Exposures

Beyond Data Breach: Cyber Trends and Exposures Beyond Data Breach: Cyber Trends and Exposures Vietnam 7 th May 2015 Jason Kelly Head of Asia Financial Lines AIG Agenda Why do companies need cyber protection Example of Cyber attack worldwide and in

More information

INFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE. I. GENERAL INFORMATION Full Name:

INFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE. I. GENERAL INFORMATION Full Name: INFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE NOTICE: COVERAGE UNDER THIS POLICY IS PROVIDED ON A CLAIMS MADE AND REPORTED BASIS AND APPLIES ONLY TO CLAIMS FIRST MADE

More information

Cyber-insurance: Understanding Your Risks

Cyber-insurance: Understanding Your Risks Cyber-insurance: Understanding Your Risks Cyber-insurance represents a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some

More information

Cyber-security: legal implications for financial institutions. IAPP Europe Data Protection Intensive 2013

Cyber-security: legal implications for financial institutions. IAPP Europe Data Protection Intensive 2013 Cyber-security: legal implications for financial institutions IAPP Europe Data Protection Intensive 2013 Vivienne Artz Managing Director and General Counsel, Citi Cyber threat landscape Kris McConkey Director,

More information

Risk and reputation in the age of disruption

Risk and reputation in the age of disruption Top 10 Global Business Risks for 2015 Allianz Risk Pulse Business interruption and supply chain risk Loss of reputation or brand value 46% 16% 2014: 43% (1) 2014: 15% (6) Natural catastrophes Market stagnation

More information

Cyber-Crime Protection

Cyber-Crime Protection Cyber-Crime Protection A program of cyber-crime prevention, data breach remedies and data risk liability insurance for houses of worship, camps, schools, denominational/association offices and senior living

More information

Embracing Cyber Risk: Insurance Solutions

Embracing Cyber Risk: Insurance Solutions Embracing Cyber Risk: Insurance Solutions ANZIIF Risk Rendezvous 15 Ian Pollard, Managing Director, Delta Insurance New Zealand Limited Agenda Risk Management Risk Transfer and Insurance Cyber attacks

More information

Cyber Risks and Insurance Solutions Malaysia, November 2013

Cyber Risks and Insurance Solutions Malaysia, November 2013 Cyber Risks and Insurance Solutions Malaysia, November 2013 Dynamic but vulnerable IT environment 2 Cyber risks are many and varied Malicious attacks Cyber theft/cyber fraud Cyber terrorism Cyber warfare

More information

Navigating Cyber Risk Exposure and Insurance. Stephen Wares EMEA Cyber Risk Practice Leader Marsh

Navigating Cyber Risk Exposure and Insurance. Stephen Wares EMEA Cyber Risk Practice Leader Marsh Navigating Cyber Risk Exposure and Insurance Stephen Wares EMEA Cyber Risk Practice Leader Marsh Presentation Format Four Key Questions How important is cyber risk and how should we view the cyber threat?

More information

EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND?

EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND? EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND? ABOUT JLT SPECIALTY JLT Specialty Insurance Services is the U.S. platform of JLT Group, the leading specialty business adivsory

More information

Risks and uncertainties

Risks and uncertainties Risks and uncertainties Our risk management approach We have a well-established risk management methodology which we use throughout the business to allow us to identify and manage the principal risks that

More information

Making Sense of Cyber Insurance: A Guide for SMEs

Making Sense of Cyber Insurance: A Guide for SMEs Making Sense of Cyber Insurance: A Guide for SMEs abi.org.uk @BritishInsurers 2 abi.org.uk Contents Introduction 4 Six Key Areas to Look Out For in Cyber Insurance Policies 5 Potential Exclusions to Look

More information

What would you do if your agency had a data breach?

What would you do if your agency had a data breach? What would you do if your agency had a data breach? 80% of businesses fail to recover from a breach because they do not know this answer. Responding to a breach is a complicated process that requires the

More information

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor Cyber Risks Management Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor 1 Contents Corporate Assets Data Breach Costs Time from Earliest Evidence of Compromise to Discovery of Compromise The Data Protection

More information

Allianz Risk Barometer on Business Risks 2014

Allianz Risk Barometer on Business Risks 2014 January 2014 Allianz Risk Pulse Allianz Risk Barometer on Business Risks 2014 The rise of interconnected risks Business interruption, natural catastrophes and fire top risks for companies in 2014, Allianz

More information

Complete Professional Indemnity

Complete Professional Indemnity Allianz Insurance plc Complete Professional Indemnity Policy Details (including Policy Summary pages 1 4) Architects Policy Summary This is a Policy Summary only and does not contain full terms and conditions

More information

Joe A. Ramirez Catherine Crane

Joe A. Ramirez Catherine Crane RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract

More information

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Data Breach Cost. Risks, costs and mitigation strategies for data breaches Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,

More information

2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE 2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2015 2015 Network Security & Cyber Risk Management: The FOURTH

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Specialists at minimising risk exposure. Management Liability Insurance Policy Overview & Benefits

Specialists at minimising risk exposure. Management Liability Insurance Policy Overview & Benefits Specialists at minimising risk exposure Management Liability Insurance Policy Overview & Benefits Management Liability Insurance Policy Overview & Key Benefits Policy Overview It s possible your clients

More information

Information and Communication Technology, Cyber and Data Security

Information and Communication Technology, Cyber and Data Security Information and Communication Technology, Cyber and Data Security Contents Information and Communication Technology 1 ICT Professional Indemnity 2 Claims scenarios 4 Cyber and Data Security 5-7 Claims

More information

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

CYBER & PRIVACY LIABILITY INSURANCE GUIDE CYBER & PRIVACY LIABILITY INSURANCE GUIDE 01110000 01110010 011010010111011001100001 01100 01110000 01110010 011010010111011001100001 0110 Author Gamelah Palagonia, Founder CIPM, CIPT, CIPP/US, CIPP/G,

More information

Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows

Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows 24 February 2015 Callum Sinclair Faith Jayne Agenda Top 10 legal need-to-knows, including: What is cyber

More information

Introduction to Warranty and Indemnity Insurance 18 October 2012

Introduction to Warranty and Indemnity Insurance 18 October 2012 Introduction to Warranty and Indemnity Insurance 18 October 2012 Mergers & Acquisitions Insurance Group Adrian Furlonge Assistant Vice President Svetlana Soroka Senior Underwriter Introduction Background

More information

Architects and Engineers Professional Liability Insurance Summary

Architects and Engineers Professional Liability Insurance Summary Architects and Engineers Professional Liability Insurance Summary Underwritten by a member of the QBE Insurance Group (QBE) This insurance is an annual contract unless stated otherwise in the quotation

More information

WHITE PAPER BREACH, PRIVACY, AND CYBER COVERAGES: FACT AND FICTION CYBER COVERAGES

WHITE PAPER BREACH, PRIVACY, AND CYBER COVERAGES: FACT AND FICTION CYBER COVERAGES BREACH, PRIVACY, AND CYBER COVERAGES: FACT AND FICTION IDT911 1 DEFINITIONS 1. Cyber Programs - Focuses on services and systems related to technology and their use in business. Risks addressed include

More information

Complete Directors & Officers

Complete Directors & Officers Allianz Insurance plc Complete Directors & Officers Policy Summary Complete Directors & Officers Policy Summary Policy Summary This is a Policy Summary only and does not contain full terms and conditions

More information

FINANCIAL LINES ACE ELITE PLUS MANAGEMENT LIABILITY INSURANCE

FINANCIAL LINES ACE ELITE PLUS MANAGEMENT LIABILITY INSURANCE FINANCIAL LINES ACE ELITE PLUS MANAGEMENT LIABILITY INSURANCE 00 The ACE Elite Plus Management Liability policy features coverage and benefits designed to address the serious risks confronting private

More information

Website Hosting Agreement

Website Hosting Agreement Website Hosting Agreement This Agreement is Between: (1) Tutch Media Limited, a company registered in England whose office is at 121c London Road, Knebworth, Herts, SG3 6EX ( the Host ) and (2) The Client

More information