Cyber Liability Insurance
|
|
- Milo Thompson
- 7 years ago
- Views:
Transcription
1 Cyber Liability Insurance John Buck Cyber Liability Specialist RP Ryan Insurance Inc N 40 th St. Suite 102 Phoenix, AZ Office: Cell: jbuck@rpryan.com
2 Cyber Liability What is Cyber Liability? Addresses the first- and third- party risks associated with the generation, storage or transmittal of digital information containing personally identifiable information (PII) or personal health records (PHI) as protected by various laws and regulations Does not cover Intellectual Property, Trademarks, Copyrights etc. that do not contain personal data protected by laws and regulations
3 What is Cyber Liability Insurance? (AKA Data Breach Insurance) Cyber Liability Insurance covers financial obligations due to the loss or theft of personal information from a first party information system Does not have to be the fault of the organization that the data is stolen from Can include fines and penalties assessed by government agencies Can include coverage for lawsuits brought by customers, clients, patients, employees, financial institutions and stockholders who are financially impacted by the breach of sensitive data
4 What Types of Companies Need Cyber Liability Insurance the Most? Health care providers Doctor office, Dentist office, Outpatient Clinics, Hospitals, Labs all generating and storing Personal Health Care Data protected by law
5 What Types of Companies Need Cyber Liability Insurance the Most? Retail Stores Stolen credit card numbers are the number one risk for retail stores One stolen credit card number can be sold and made into thousands of duplicate cards often sold on the Internet for as little as $5 each FBI, Banks and Merchant service providers have the software to trace stolen credit cards back to the source, thus holding the store liable
6 What Types of Companies Need Cyber Liability Insurance the Most? Telecommunications Service Providers Local and long-distance phone companies Internet service providers Cable and satellite television service providers Manufacturers Equipment used by service providers Some consumer devices Components
7 What Types of Companies Need Cyber Liability Insurance the Most? Software Prepackaged software Custom software Information Technology Services Consulting Programming services Data services (hosting, aggregation, etc.)
8 Types of cyber attacks that can lead to cyber breach penalties and lawsuits for your company POS System Attacks retail is highest risk Card Skimmers anyone who accepts credit cards for payment involving physical scanning of card Web Site Attacks anyone with a website Insider Misuse or Hacking anyone with employees, especially disgruntled ones Physical Theft/Loss employees and executives Miscellaneous Errors employees and executives Crimeware backdoors inserted by hackers Cyber Espionage inside and outside hackers from anywhere in the world
9 Typical Cyber Liability expenses that can be insured for Notification Expenses Customers must be notified of a breach of their sensitive information. May be voluntary or forced by laws and regulations Crisis Management/PR Expense Assuring your customers that you have taken steps to mitigate the breach Win back their confidence and/or loyalty Pay cyber extortion expense Million dollar extortion expenses have been paid to mitigate breach
10 Typical Cyber Liability expenses that can be insured for Continued from previous slide Payment of fines and penalties from government agencies Payment of awards from lawsuits from customers, patients, employees, stockholders as discussed in previous slide
11 Typical Retail Risk: POS Intrusions Point of Sale (POS) Intrusions: Remote attacks against the environments where retail transactions are conducted, specifically where card-present purchases are made, i.e., cards are physically scanned. POS Intrusions accounted for 14% of the cyber attacks reported in the Ponemon study. POS attacks are the greatest threat to retail establishments like department stores and restaurants but anyone accepting credit cards for payment is subject to attack e.g., ipad credit card scans
12 POS Intrusions Credit card transactions are regulated by PCI 3.0 Payment Card Industry Regulation which can impose heavy fines on any retail establishment whose customer credit card data is lost or stolen but government regulations will not prevent theft by hackers Lost or stolen credit card data is sold on the black market and is typically used to produce duplicate credit cards that can be sold and used all over the world Stolen customer data can be traced back to the source using forensic techniques by the FBI, Banks, and Credit Card Processors
13 Target Breach The cases against Target were consolidated in the US District Court for the District of Minnesota to consist of (as of May 2014, more to come): 81 class action suits brought by consumers 28 class action suits brought by financial institutions 4 shareholder derivative actions
14 Web Attacks on Your Website Web App Attacks any incident in which a web application was the target of the attack. This includes exploits of code-level vulnerabilities in the application as well as thwarting authentication mechanisms Denial of Service Attacks (DoS) hackers take over thousands of PCs and use them to simultaneously request service from a targeted website. Legitimate customers can not access the website and the company loses revenue and credibility with their customers who may also sue the targeted company for loss of service during attack. Use of Website as a backdoor into the company network to steal data, plant viruses, etc.
15 Insider and Privilege Misuse to Guard Against in Your Business Any unapproved or malicious use of your organizational resources Too many people in your company have access to too much data Limit access and change passwords frequently to help mitigate insider threats
16 Miscellaneous Errors by Your Employees Incidents where unintentional actions directly compromised a security attribute of an information asset-e.g., phishing to get passwords from unsuspecting and/or untrained employees Target breach was due to air conditioning vendor gaining access to privileged information and planting a back door into the system for later retrieval of customer data took several months to get the data There are now huge networks of hackers working in teams to gain access to high value systems- anyone can buy hacking software on the Internet and make a good living from their grandmother s basement (aka script kiddies mostly having fun) but most big jobs are for big financial payoffs from Russia and places where the FBI can t operate until it s too late
17 Crimeware Any malware incident that did not fit other patterns like espionage or POS (Point of Sale) attacks Covers a wide variety of incidents involving malware of various types and purposes
18 Payment Card Skimmers Involves POS skimming devices physically placed on or near devices that read credit card magnetic strips to accept payment ATMs, gas pumps, POS terminals are big sources of hidden (implanted) credit card magnetic strip readers Placed by someone like a maintenance worker, employee or hacker and usually removed at a later date to avoid detection Hackers walk around stores like Walmart or sit in restaurants with skimmers that work when they are there and are not found by anyone making a search
19 Cyber-Espionage Defined as unauthorized network or system access linked to stateaffiliated hackers and/or exhibiting the motive of espionage Usually hard core criminal organizations operating in Russia and East Europe where the FBI can t get at them They target corporations, governments, NGO s, etc., but also small to medium businesses as well to steal personal data, trade secrets, government secrets, etc.
20 Physical Theft and Loss Missing assets containing sensitive data Laptops, ipads, thumb drives left in unlocked cars, restaurants, etc. Can include paper assets left in cars, boxes of paper data in storage lockers, etc.
21 Key Questions for all owners and C-suite personnel who must manage financial risk How much personal data do you store on employees, customers, clients, etc.? What is your plan for minimizing your risk of losing sensitive data? How much can you afford to spend on penalties and lawsuits in the event of a data breach that gets traced back to your company?
22 Key Questions cont. What would happen if customer and employee private information is stolen from your company? How many paper and electronic records containing sensitive information do you have stored (file cabinets, storage sheds, PCs) Do you have written agreements (contract liability) concerning privacy and protection of data with outside vendors? Document storage and destruction, janitorial, air conditioning, etc., etc.
23 Key Questions cont. What type of social media is your business using? Are their restrictions to its administration? Risks include invasion of privacy, copyright and trademark liability, defamation and slander-usually covered by other liability insurance policies Are you aware of the exclusions in your existing P&C and GL policies? Most cyber liability claims such as social media liabilities, electronic data and cost to recreate, outages caused by viruses or hackers will not be covered under existing policies Are you aware of the most recent privacy and data breaches in your industry for evaluation of your potential risks? Good sources of information pertinent to your industry can be found on Google or privacyrights.org (an excellent database of actual breaches)
24 Key Questions cont. Are you aware that the average 1 st party cost for a data breach claim is $206 per record Costs include notification and credit monitoring for customers as well as public relations and call centers Are you familiar with all state regulations that you do business in (not just your home state) for notification in the event of a privacy breach? Look on for state regulations
25 Key Questions cont. Do any of your employees access your system from a mobile device? The Ponemon study shows that 81% of employees have access to PII (Personally Identifiable Information) on ipads, smart phones and employee laptops the is referred to as the BYOD (Bring your own device) problem Have you considered the Third-Party costs to your business in the event of a Privacy Breach? Intellectual property infringement, reputation injury, customer s systems being unavailable and the cost to defend your business against numerous lawsuits 50% of small to medium businesses shut down after a major breach if they can t cover the expense (Target is self insured are you?)
26 Questions from a typical Cyber Liability Questionnaire for an insurance quote 1. Do you control who has access to your computer network? 2. Do you have a firewall between your information system and the Internet? 3. Do you have firewall protections on each of your individual workstations? 4. Do you have a virus protection program in place? 5. Do you outsource any part of your internal networking/computer system or Internet access to others? 6. Do you have a person responsible for IT security?
27 Typical quote questions cont. 7. Does your hiring process include criminal background checks? 8. Do you have a written security policy that covers both physical (premise) and information security? 9. Do you test your policy s security or privacy controls? 10. Have you ever experienced a privacy or data breach? 11. Do you allow employees to download personal client information or other confidential information onto laptops or other data files? (If yes, is the data encrypted?)
28 Typical quote questions cont. 12. What personal client or employee information is held in your company s information system or employee devices? Social Security Numbers Driver s License Numbers Financial Account Numbers Credit Card Numbers Personal Health Information Customer Information Other (please specify) don t hide anything so that you get a realistic quote that represents your real risk 13. Have you ever filed a Privacy/Data Breach claim? (If yes, please note date of incident and provide brief explanation)
29 Why Get a Quote (or several quotes)? It doesn t cost anything to have a qualified insurance agent prepare a quote for your cyber liability insurance needs By getting quotes from several insurance carriers you will get the expertise of several underwriters who can help you navigate the complex waters of cyber liability insurance, which is still in its early phase of development Before or after you get a quote for cyber liability insurance have a qualified outside security expert do an evaluation of your physical and network security system and provide a written report that can be passed on to the insurance agent and his underwriters for proper evaluation of your premium and coverage requirements
30 10 Reasons to buy Cyber Liability Insurance 1. High cost of breach notification in the event of a breach 2. Loss of third-party (your customers and employees) data results in class action lawsuits that can put you out of business if you aren t protected by cyber liability insurance 3. The data in your network is not covered by standard commercial property & casualty policies yet it is the most valuable asset you have (how much to replace lost or stolen data versus the cost to replace a computer network?) 4. Information Systems (IT systems) are critical to operating your day to day business but their downtime is not usually covered by standard business policies-check your current policy
31 10 Reasons to Buy cont. 5. Cyber crime is the fastest growing crime in the world, but most attacks are not covered by standard commercial insurance policies 6. Retailers face severe penalties if they lose their customer credit card data Global credit card crime is worth over $7.5billion and this risk is increasingly being transferred from the credit card service providers to the business owners Retailers can be held liable for forensic investigation costs, credit card reissuance costs and the actual fraud (purchases) conducted on stolen cards Cyber liability insurance can offset many of these costs
32 10 Reasons to Buy cont. 7. Your reputation is your number one asset, so why not insure it? Cyber liability insurance can insure your reputation in the event of a cyber security breach It can pay for costs of engaging a PR firm to help restore your reputation, but also for the loss of future sales that arise as a direct result of customers switching to your competitors You can t claim that a cyber breach is not your fault and therefore you should not have to bear the expense you are the one your customers and government agencies will hold liable no matter the cause of the breach 8. Social media usage is at an all time high and claims are on the rise Cyber liability insurance can help provide coverage for claims arising from leaked information, defamatory statements or copyright infringements
33 10 Reasons to Buy cont. 9. Portable devices increase the risk of loss or theft of information Cyber liability insurance can cover the costs associated with a data breach should a portable device be lost, stolen or fall victim to a virus 10. It s not just big businesses being targeted by hackers, but lots of small ones too, often part of a massive hack attack Hackers often practice on many small businesses to learn the techniques and pathways into the larger businesses. The small businesses suffer the same damage as the large ones A third of global cyber attacks were aimed at businesses with less than 250 employees
34 Cyber Liability Risk Applies to all sectors of the e-commerce and Internet world e-professionals those who provide traditional services over the Internet Information Technology (Internet) Professionals website developers, systems/computer consultants, etc. E-Commerce Companies companies existing only on the net, clicks & mortar companies, and content providers such as portals, search engines and specialty providers of content Internet Advertisers traditional organizations utilizing the Internet for marketing
35 Examples of Cyber Liability Claims Extortion 1 Entire database of publicly traded corporation was encrypted by a disgruntle employee Ransom note demanded $1 million for the password to unlock the data The company paid the ransom!!
36 Examples of Cyber Liability Claims Extortion-2 Accounting firm upgrades their computers and scrubs old hard drives before tossing them out Hacker gets ahold of discarded hard drives and restored the data which included financial records of clients Firm bought back the hard drives for $1 million
37 Examples of Cyber Liability Claims Mischievous Hacking Repeated Denial of Service attacks by a hacker have virtually shut down a state s Public Access Network Computer This is an example of mischievous behavior that shuts down an system but there is no ransom involved Hacker typically brags to his friends of his accomplishment
38 Examples of Cyber Liability Claims Mischievous Hacking An Internet Service Provider (ISP) was hacked The hacker planted swastikas and racist messages on web pages while masquerading as the provider s administrator, erased data on two computers and shut down the system The ISP was shut down for 12 hours and files created in the several days prior to the attack were lost
39 Examples of Cyber Liability Claims Loss of Data A personal laptop computer was stolen from a data processing center The laptop contained the account numbers for over 300,000 credit card customers
40 Examples of Cyber Liability Claims Loss of Data A technical instruments manufacturer had a disgruntled employee delete their entire database It cost the company $7.8 million in lost revenues and $3.2 million to replace the lost data
41 Statistics of Cyber Liability Losses 24% of data breaches occur in retail environments and restaurants The average total cost of a cyber security breach is estimated at $5.4 million 50% of small businesses who must bear the cost of a breach are out of business within 6 months There are 46 different state laws and another set of federal laws and regulations governing the collection and storage of data and the prevention and reporting of a breach From Don t be a Cyber-Thief s Next Victim by Leon Silver and Gabe Zorogastua of the Polsinelli Law Firm, Phoenix, AZ
42 Reduction of Cyber Security Losses It takes a team of cyber security consultants, IT experts, insurance, security and law firms to deal with the extensive and increasing cyber threat to US businesses Cyber security concerns are now part of doing business, and general counsel and C-Suite executives must be ready to guide their companies through these complex issues Prevention is the first step to minimizing cyber security liability From Don t be a Cyber-Thief s Next Victim by Leon Silver and Gabe Zorogastua of the Polsinelli Law Firm, Phoenix, AZ
43 Reduction of Cyber Security Losses The following steps can help minimize the cost and likelihood of security breaches: Security measures before a breach Have an incident response plan Establish a strong security infrastructure Appoint a Chief Information Security Officer Cyber-security audits Businesses should conduct regular cyber-security audits and limit access to sensitive data by third parties and employees From Don t be a Cyber-Thief s Next Victim by Leon Silver and Gabe Zorogastua of the Polsinelli Law Firm, Phoenix, AZ
44 Reduction of Cyber Security Losses Cyber-security insurance Businesses should review insurance policies to determine whether and to what extent they are covered for cyber-security threats Encryption If a data breach occurs, encryption can help minimize liability From Don t be a Cyber-Thief s Next Victim by Leon Silver and Gabe Zorogastua of the Polsinelli Law Firm, Phoenix, AZ
45 Notification in the Event of a Breach Health Insurance Portability and Accountability Act (HIPPA) and Health Information Technology for Economic and Clinical Health Act (HITECH) requires covered entities to protect against reasonably anticipated threats or hazards to security The HITECH Act requires covered entities and business associates to notify the individuals whose protected health information was accessed no later than 60 days after the breach was discovered From Don t be a Cyber-Thief s Next Victim by Leon Silver and Gabe Zorogastua of the Polsinelli Law Firm, Phoenix, AZ
46 Notification in the Event of a Breach If the breach affects more than 500 individuals, the law also requires notification within 60 days after the breach was discovered to the US Department of Health and Human Services and the media From Don t be a Cyber-Thief s Next Victim by Leon Silver and Gabe Zorogastua of the Polsinelli Law Firm, Phoenix, AZ
47 Notification in the Event of a Breach Gramm-Leach-Bliley Act requires financial institutions to publicize their privacy policies and establish internal safeguards and procedures to protect consumer information Related guidelines require covered financial institutions to notify customers whose personal information has been subject to unauthorized access or use if misuse of the customer s information has occurred or is reasonably possible, unless law enforcement determines that notification will interfere with a criminal investigation From Don t be a Cyber-Thief s Next Victim by Leon Silver and Gabe Zorogastua of the Polsinelli Law Firm, Phoenix, AZ
48 Notification in the Event of a Breach Securities & Exchange Commission (SEC) has issued guidance stating that publicly traded companies should report certain cyber instances State Law Currently 46 states, the District of Columbia, Puerto Rico, and the Virgin Islands have enacted laws requiring notification of security breaches involving personal information From Don t be a Cyber-Thief s Next Victim by Leon Silver and Gabe Zorogastua of the Polsinelli Law Firm, Phoenix, AZ
49 Potential Litigation Potential claims by private parties and the government include: State-law claims filed under individual states consumer protection laws, tort and contract law, fiduciary requirements, and other cyber security rules FTC Safeguards Rule the FTC has brought numerous enforcement actions to address whether businesses security systems are reasonable and appropriate to protect consumer information From Don t be a Cyber-Thief s Next Victim by Leon Silver and Gabe Zorogastua of the Polsinelli Law Firm, Phoenix, AZ
50 Potential Litigation SEC Enforcement Actions. The SEC s Division of Corporate Finance has taken the position that public companies should disclose their risk of cyber incidents Failure to disclose cyber security breaches or risks could lead to actions on security anti-fraud provisions like Rule 10b-5 or books and records violations under Rule 13b2-2 From Don t be a Cyber-Thief s Next Victim by Leon Silver and Gabe Zorogastua of the Polsinelli Law Firm, Phoenix, AZ
51 Do You Really Need Cyber Liability Insurance? LinkedIn, eharmony, DropBox, Paypal and Yahoo have all been hacked and millions of customer records have been lost This list does not even include the big retailers like Target and Home Depot that have been hacked with hundreds of thousands of credit card data lost Liability for loss of customer data or employee data is not typically covered under normal corporate insurance policies From Do You Really Need Cyber Liability Insurance?, white paper from ManageEngine
52 Do You Really Need Cyber Liability Insurance? Be careful when evaluating your existing business insurance policy since some policies that offer general liability coverage and directors and officers liability may provide some limited cyber liability coverage but may not provide all that is required Analyze your existing policy in detail with the help of experts before you have a cyber breach because after the breach it is too late A recent survey by the Chubb Group of Insurance Companies found that 65% of public companies forego cyber insurance even though they consider cyber risk as their number one concern From Do You Really Need Cyber Liability Insurance?, white paper from ManageEngine
53 Do You Really Need Cyber Liability Insurance? 25% of those companies surveyed are expecting a cyber breach in the coming year and 71% have cyber breach response plans in place but only 35% have cyber liability insurance It is not only high-profile and high-risk companies that are at risk of cyber breaches Small to medium sized companies are at equal risk of cyber breaches 72% of all data breaches occurred in Small to Medium (SMB) businesses according to studies by the Secret Service and Verizon Communications Inc. From Do You Really Need Cyber Liability Insurance?, white paper from ManageEngine
54 Do You Really Need Cyber Liability Insurance? So why do only 35% of companies invest in cyber liability insurance? For one, many executives don t know it exists, and even if they do they probably don t think an attack will happen to them, or they are not overly worried about the potential fallout of such a breach Premiums are still high since so few companies are buying cyber liability insurance and the payouts can be in the millions of dollars The premiums for e-commerce companies are high because these companies are considered high risk since they acquire and store large amounts of credit card data for purchases from their site From Do You Really Need Cyber Liability Insurance?, white paper from ManageEngine
55 Do You Really Need Cyber Liability Insurance? The other high risk companies are medical related institutions hosting data, such as date of birth information, social security numbers and medical records You can reduce your cyber liability premiums by reinforcing your security practices before you apply-like a good driver discount In other words, having a lower risk factor for data breaches lowers your insurance premium One easy way to lower your risk of a data breach is to have strong password protection on your system by using encryption and changing passwords regularly From Do You Really Need Cyber Liability Insurance?, white paper from ManageEngine
56 Do You Really Need Cyber Liability Insurance? When your system consists of multiple units of servers, apps, cloud services, databases, tablets and laptops you can purchase affordable password management solutions to help offset the cost of cyber liability premiums Other actions that can reduce the cost of cyber liability premiums are: Regular risk assessments by outside cyber security analysts A written cyber security policy that identifies and lists critical assets and defines policies for physical security, account management, and backup and recovery of critical data among other areas Leverage firewalls, virtual private networks, anti-virus and anti-spam software and secure mobile solutions to secure network access and mobile devices From Do You Really Need Cyber Liability Insurance?, white paper from ManageEngine
57 Types of Commercial Liability Insurance Don t Expect Your Existing Commercial General Liability Insurance to Cover Cyber Liability Losses! Commercial General Liability (GL) Coverage Exclusions (aka, will not pay!): Personal and Advertising Injury Electronic Data applies to damages arising out of the loss of use of, damage to, corruption of, inability to access, or inability to manipulate electronic data Illegal Distribution applies to telemarketing and anti-spam laws
58 Now that you know the potential threat to your business due to cyber attacks it s time to take action!! Click the Quote Request Button and let me get you several quotes from reputable insurance companies to protect you from extensive financial losses due to cyber attacks on your company. The cyber liability policy can be standalone or combined with the rest of your business insurance. John Buck, Cyber Liability Insurance Specialist RP Ryan Insurance Inc N 40 th St Suite 102 Phoenix AZ Phone: x 252 Cell: jbuck@rpryan.com
GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
More informationData Breach Cost. Risks, costs and mitigation strategies for data breaches
Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,
More information10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
More informationRISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION
RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former
More informationManaging Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec
Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Jeremy Ong Divisional Vice-President Great American Insurance Company November 13, 2010 1 Agenda Overview of data breach statistics
More informationNetwork Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
More informationCyber Threats: Exposures and Breach Costs
Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals
More informationYOUR TRUSTED PARTNER IN A DIGITAL AGE. A guide to Hiscox Cyber and Data Insurance
YOUR TRUSTED PARTNER IN A DIGITAL AGE A guide to Hiscox Cyber and Data Insurance 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and
More informationData Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com
Data Security 101 A Lawyer s Guide to Ethical Issues in the Digital Age Christopher M. Brubaker cbrubaker@clarkhill.com November 4-5, 2015 Pennsylvania Bar Institute 21 st Annual Business Lawyers Institute
More informationUpdates within Network Security and Privacy Risk Management
Updates within Network Security and Privacy Risk Management RIMS Minneapolis Meeting Melissa Krasnow, Partner, Dorsey & Whitney LLP (Minneapolis, MN) Mario Paez, Midwest Practice Leader for Tech., Privacy,
More informationCyber Exposure for Credit Unions
Cyber Exposure for Credit Unions What it is and how to protect yourself L O C K T O N 2 0 1 2 www.lockton.com Add Cyber Title Exposure Here Overview #1 financial risk for Credit Unions Average cost of
More informationData breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC
Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you
More informationReducing Risk. Raising Expectations. CyberRisk and Professional Liability
Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Are you exposed to CyberRisk? Like nearly every other business, you have likely capitalized on the advancements in technology today
More informationTen Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
More informationData Breach and Senior Living Communities May 29, 2015
Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs
More informationData breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd
Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures
More informationCybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
More informationcyber invasions cyber risk insurance AFP Exchange
Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance
More informationISO? ISO? ISO? LTD ISO?
Property NetProtect 360 SM and NetProtect Essential SM Which one is right for your client? Do your clients Use e-mail? Rely on networks, computers and electronic data to conduct business? Browse the Internet
More informationAPPLICATION FOR TECHNOLOGY & PRIVACY PROFESSIONAL LIABILITY
APPLICATION FOR TECHNOLOGY & PRIVACY PROFESSIONAL LIABILITY GENERAL INFORMATION 1. APPLICANT NAME: 2. PHONE: 3. MAILING ADDRESS: 4. WEB ADDRESS: 5. The following officer of the Applicant is designated
More informationPrivacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014
Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014
More informationWHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
More informationDATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET
DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET 2014 NSGA Management Conference John Webb Jr., CIC Emery & Webb, Inc. Inga Goddijn, CIPP/US Risk Based Security, Inc. Not just a big business problem
More informationInternet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler
Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in
More informationCYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014
CYBER LIABILITY Network Security and Privacy Bring on tomorrow May 15, 2014 1 AGENDA I. Identify Exposures II. Identify how a breach can occur III. The Coverage (Third Party Liability + First Party Losses)
More informationCYBER RISK SECURITY, NETWORK & PRIVACY
CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread
More informationDiscussion on Network Security & Privacy Liability Exposures and Insurance
Discussion on Network Security & Privacy Liability Exposures and Insurance Presented By: Kevin Violette Errors & Omissions Senior Broker, R.T. Specialty, LLC February, 25 2014 HFMA Washington-Alaska Chapter
More informationCyber/Information Security Insurance. Pros / Cons and Facts to Consider
1 Cyber/Information Security Insurance Pros / Cons and Facts to Consider 2 Presenters Calvin Rhodes, Georgia Chief Information Officer Ron Baldwin, Montana Chief Information Officer Ted Kobus, Partner
More informationPrivacy Rights Clearing House
10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights
More informationInsurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
More informationPCI Compliance for Healthcare
PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?
More informationSINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry
SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :
More informationInternet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
More informationCybercrime: Protecting Your Digital Assets in Today's Threat Landscape
Cybercrime: Protecting Your Digital Assets in Today's Threat Landscape Presented by Rachel Ratcliff OM03 Saturday, 10/5/2013 9:30 AM - 10:45 AM Cybercrime: Protecting Your Digital Assets in Today s Threat
More informationINFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES
INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES NOTICE: INSURING AGREEMENTS I.A., I.C. AND I.D. OF THIS POLICY PROVIDE COVERAGE ON A CLAIMS MADE AND REPORTED BASIS AND APPLY ONLY
More informationAPIP - Cyber Liability Insurance Coverages, Limits, and FAQ
APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP
More informationMitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
More informationINFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE. I. GENERAL INFORMATION Full Name:
INFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE NOTICE: COVERAGE UNDER THIS POLICY IS PROVIDED ON A CLAIMS MADE AND REPORTED BASIS AND APPLIES ONLY TO CLAIMS FIRST MADE
More informationPreparing for the HIPAA Security Rule
A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions
More informationCyber/ Network Security. FINEX Global
Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over
More informationCyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
More informationThe Top Ten of Information Security - For 2015
7 th Annual Information Security Summit The Executive Forum Information Security Management Overview June 4, 2015 Copyright 2015. Citadel Information Group. All Rights Reserved. 2 Establishing Leadership.
More informationJoe A. Ramirez Catherine Crane
RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract
More informationCyber and Data Security. Proposal form
Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which
More informationCyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day
Lloyd s of London (Reuters) May 8, 2000 Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Rivers Casino, Pittsburgh November 17, 2014
More informationLessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd
Lessons Learned from Recent HIPAA and Big Data Breaches Briar Andresen Katie Ilten Ann Ladd Recent health care breaches Breach reports to OCR as of February 2015 1,144 breaches involving 500 or more individual
More informationNetwork Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Pam Townley, AVP / Eastern Zonal Manager AIG Professional Liability Division Jennifer Bolling, Account Executive Gallagher Management Liability Division
More informationFACT SHEET: Ransomware and HIPAA
FACT SHEET: Ransomware and HIPAA A recent U.S. Government interagency report indicates that, on average, there have been 4,000 daily ransomware attacks since early 2016 (a 300% increase over the 1,000
More informationProactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
More informationInformation Security Addressing Your Advanced Threats
Information Security Addressing Your Advanced Threats Where We are Going Information Security Landscape The Threats You Face How To Protect Yourself This Will Not Be Boring What Is Information Security?
More informationManaging Cyber & Privacy Risks
Managing Cyber & Privacy Risks NAATP Conference 2013 NSM Insurance Group Sean Conaboy Rich Willetts SEAN CONABOY INSURANCE BROKER NSM INSURANCE GROUP o Sean has been with NSM Insurance Group for the past
More informationCYBER SECURITY SPECIALREPORT
CYBER SECURITY SPECIALREPORT 32 The RMA Journal February 2015 Copyright 2015 by RMA INSURANCE IS AN IMPORTANT TOOL IN CYBER RISK MITIGATION Shutterstock, Inc. The time to prepare for a potential cyber
More informationLIGC-ACC Presentation November 9, 2015
Bryan Frank, DDIS Info Sec Corp, panelist Jennifer M. Mone, Deputy General Counsel, Hofstra University, panelist Keith J. Frank, Partner, Forchelli, Curto, Deegan, Schwartz, Mineo & Terrana,. LLP, moderator
More informationHow To Buy Cyber Insurance
10-26-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
More informationCyber-insurance: Understanding Your Risks
Cyber-insurance: Understanding Your Risks Cyber-insurance represents a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some
More informationDemystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature
Demystifying Cyber Insurance Jamie Monck-Mason & Andrew Hill Introduction What is cyber? Nomenclature 1 What specific risks does cyber insurance cover? First party risks - losses arising from a data breach
More informationI ve been breached! Now what?
I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have
More informationNZI LIABILITY CYBER. Are you protected?
NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is
More informationINFORMATION SECURITY & PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY APPLICATION
INFORMATION SECURITY & PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY APPLICATION NOTICE: COVERAGE UNDER THIS POLICY IS PROVIDED ON A CLAIMS MADE AND REPORTED BASIS AND APPLIES ONLY TO CLAIMS FIRST
More information10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
More informationCybersecurity Workshop
Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153
More informationDATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT
Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security
More informationIRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411
IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING
More informationInformation Security for the Rest of Us
Secure Your Way Forward. AuditWest.com Information Security for the Rest of Us Practical Advice for Small Businesses Brian Morkert President and Chief Consultant 1 Introduction President Audit West IT
More informationIs the PCI Data Security Standard Enough?
Is the PCI Data Security Standard Enough? By: Christina M. Freeman ICTN 6870 Advanced Network Security Abstract: This paper will present the researched facts on Payment Card Industry Data Security Standard
More informationSMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015
SMB Data Breach Risk Management Best Practices By Mark Pribish February 19, 2015 Presentation Agenda About Mark Pribish Information Governance The Threat Landscape Data Breach Trends Legislative and Regulatory
More information2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage
2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage Chris Reese Vice President, Director of Underwriting Connie Rivas Asst. Vice President, Contracts and
More informationCyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor
Cyber Risks Management Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor 1 Contents Corporate Assets Data Breach Costs Time from Earliest Evidence of Compromise to Discovery of Compromise The Data Protection
More informationCYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become
More informationCyber and data Policy wording
Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and
More informationThe Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016
The Future of Data Breach Risk Management Response and Recovery Increasing electronic product life and reliability The Cybersecurity Forum April 14, 2016 Today s Topics About Merchants Information Solutions,
More informationEnterprise PrivaProtector 9.0
IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS
More informationDesktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
More informationManaging Cyber Risk through Insurance
Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes
More informationHow To Protect Yourself From Cyber Threats
Cyber Security for Non- Profit Organizations Scott Lawler CISSP- ISSAP, ISSMP, HCISPP Copyright 2015 LP3 May 2015 Agenda IT Security Basics e- Discovery Compliance Legal Risk Disaster Plans Non- Profit
More informationCyber-Crime Protection
Cyber-Crime Protection A program of cyber-crime prevention, data breach remedies and data risk liability insurance for houses of worship, camps, schools, denominational/association offices and senior living
More informationCyber Risk Insurance for Agents. Frequently Asked Questions
Cyber Risk Insurance for Agents Frequently Asked Questions 1 Cyber Risk Insurance About Great American Insurance Great American Insurance Group s roots go back to 1872 with the founding of its flagship
More informationCybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
More informationCollateral Effects of Cyberwar
Your texte here. Collateral Effects of Cyberwar by Ilia Kolochenko for Geneva Information Security Day 9 th of October 2015 Quick Facts and Numbers About Cybersecurity In 2014 the annual cost of global
More informationPROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS
PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS The following claim scenarios are hypothetical and are offered solely to illustrate the types of situations that may result in claims. Although sorted by industry,
More informationPrivacy / Network Security Liability Insurance Discussion. January 30, 2013. Kevin Violette RT ProExec
Privacy / Network Security Liability Insurance Discussion January 30, 2013 Kevin Violette RT ProExec 1 Irrefutable Laws of Information Security 1) Information wants to be free People want to talk, post,
More informationPayment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.
Payment Card Industry Data Security Standard Training Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc. March 27, 2012 Agenda Check-In 9:00-9:30 PCI Intro and History
More informationCoverage is subject to a Deductible
Frank Cowan Company Limited 75 Main Street North, Princeton, ON N0J 1V0 Phone: 519-458-4331 Fax: 519-458-4366 Toll Free: 1-800-265-4000 www.frankcowan.com CYBER RISK INSURANCE DETAILED APPLICATION Notes:
More information$22k. Payment Card Data Breaches: What You Need to Know About Your Risk and Liability. First Data Market Insight
Need to Know About Your Risk and Liability Many small merchants are surprised to learn that they can be held liable for tens of thousands of dollars in fines and other expenses when a card data breach
More informationACE Advantage PRIVACY & NETWORK SECURITY
ACE Advantage PRIVACY & NETWORK SECURITY SUPPLEMENTAL APPLICATION COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY AND/OR NETWORK SECURITY LIABILITY COVERAGE. Please submit with
More informationCSR Breach Reporting Service Frequently Asked Questions
CSR Breach Reporting Service Frequently Asked Questions Quick and Complete Reporting is Critical after Data Loss Why do businesses need this service? If organizations don t have this service, what could
More informationHow-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
More informationCyber Liability Insurance Data Security, Privacy and Multimedia Protection
Page 1 of 5 Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such an alarming rate and business is more and more reliant on IT
More informationplantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
More informationCyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?
Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies
More informationReducing Cyber Risk in Your Organization
Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than
More informationCyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029
Cyber Liability Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029 Today s Agenda What is Cyber Liability? What are the exposures? Reality of a
More informationComputer Security at Columbia College. Barak Zahavy April 2010
Computer Security at Columbia College Barak Zahavy April 2010 Outline 2 Computer Security: What and Why Identity Theft Costs Prevention Further considerations Approach Broad range of awareness Cover a
More informationCyber Risks and Insurance Solutions Malaysia, November 2013
Cyber Risks and Insurance Solutions Malaysia, November 2013 Dynamic but vulnerable IT environment 2 Cyber risks are many and varied Malicious attacks Cyber theft/cyber fraud Cyber terrorism Cyber warfare
More informationHow To Cover A Data Breach In The European Market
SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to
More informationMIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
More informationThe 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance
Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand
More informationCyber Liability & Data Breach Insurance Claims
Cyber Liability & Data Breach Insurance Claims A Study of Actual Payouts for Covered Data Breaches Mark Greisiger President NetDiligence June 2011 Last year, privacy breaches ran about 1-2 per week. This
More informationTHE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill
THE ANATOMY OF A CYBER POLICY Jamie Monck-Mason & Andrew Hill What s in a name? Lack of uniformity in policies: Cyber Cyber liability Data protection Tech PI The scope of cyber insurance First party coverage
More informationHow to Practice Safely in an era of Cybercrime and Privacy Fears
How to Practice Safely in an era of Cybercrime and Privacy Fears Christina Harbridge INFORMATION PROTECTION SPECIALIST Information Security The practice of defending information from unauthorised access,
More information