Cyber Liability Insurance

Size: px
Start display at page:

Download "Cyber Liability Insurance"

Transcription

1 Cyber Liability Insurance John Buck Cyber Liability Specialist RP Ryan Insurance Inc N 40 th St. Suite 102 Phoenix, AZ Office: Cell: jbuck@rpryan.com

2 Cyber Liability What is Cyber Liability? Addresses the first- and third- party risks associated with the generation, storage or transmittal of digital information containing personally identifiable information (PII) or personal health records (PHI) as protected by various laws and regulations Does not cover Intellectual Property, Trademarks, Copyrights etc. that do not contain personal data protected by laws and regulations

3 What is Cyber Liability Insurance? (AKA Data Breach Insurance) Cyber Liability Insurance covers financial obligations due to the loss or theft of personal information from a first party information system Does not have to be the fault of the organization that the data is stolen from Can include fines and penalties assessed by government agencies Can include coverage for lawsuits brought by customers, clients, patients, employees, financial institutions and stockholders who are financially impacted by the breach of sensitive data

4 What Types of Companies Need Cyber Liability Insurance the Most? Health care providers Doctor office, Dentist office, Outpatient Clinics, Hospitals, Labs all generating and storing Personal Health Care Data protected by law

5 What Types of Companies Need Cyber Liability Insurance the Most? Retail Stores Stolen credit card numbers are the number one risk for retail stores One stolen credit card number can be sold and made into thousands of duplicate cards often sold on the Internet for as little as $5 each FBI, Banks and Merchant service providers have the software to trace stolen credit cards back to the source, thus holding the store liable

6 What Types of Companies Need Cyber Liability Insurance the Most? Telecommunications Service Providers Local and long-distance phone companies Internet service providers Cable and satellite television service providers Manufacturers Equipment used by service providers Some consumer devices Components

7 What Types of Companies Need Cyber Liability Insurance the Most? Software Prepackaged software Custom software Information Technology Services Consulting Programming services Data services (hosting, aggregation, etc.)

8 Types of cyber attacks that can lead to cyber breach penalties and lawsuits for your company POS System Attacks retail is highest risk Card Skimmers anyone who accepts credit cards for payment involving physical scanning of card Web Site Attacks anyone with a website Insider Misuse or Hacking anyone with employees, especially disgruntled ones Physical Theft/Loss employees and executives Miscellaneous Errors employees and executives Crimeware backdoors inserted by hackers Cyber Espionage inside and outside hackers from anywhere in the world

9 Typical Cyber Liability expenses that can be insured for Notification Expenses Customers must be notified of a breach of their sensitive information. May be voluntary or forced by laws and regulations Crisis Management/PR Expense Assuring your customers that you have taken steps to mitigate the breach Win back their confidence and/or loyalty Pay cyber extortion expense Million dollar extortion expenses have been paid to mitigate breach

10 Typical Cyber Liability expenses that can be insured for Continued from previous slide Payment of fines and penalties from government agencies Payment of awards from lawsuits from customers, patients, employees, stockholders as discussed in previous slide

11 Typical Retail Risk: POS Intrusions Point of Sale (POS) Intrusions: Remote attacks against the environments where retail transactions are conducted, specifically where card-present purchases are made, i.e., cards are physically scanned. POS Intrusions accounted for 14% of the cyber attacks reported in the Ponemon study. POS attacks are the greatest threat to retail establishments like department stores and restaurants but anyone accepting credit cards for payment is subject to attack e.g., ipad credit card scans

12 POS Intrusions Credit card transactions are regulated by PCI 3.0 Payment Card Industry Regulation which can impose heavy fines on any retail establishment whose customer credit card data is lost or stolen but government regulations will not prevent theft by hackers Lost or stolen credit card data is sold on the black market and is typically used to produce duplicate credit cards that can be sold and used all over the world Stolen customer data can be traced back to the source using forensic techniques by the FBI, Banks, and Credit Card Processors

13 Target Breach The cases against Target were consolidated in the US District Court for the District of Minnesota to consist of (as of May 2014, more to come): 81 class action suits brought by consumers 28 class action suits brought by financial institutions 4 shareholder derivative actions

14 Web Attacks on Your Website Web App Attacks any incident in which a web application was the target of the attack. This includes exploits of code-level vulnerabilities in the application as well as thwarting authentication mechanisms Denial of Service Attacks (DoS) hackers take over thousands of PCs and use them to simultaneously request service from a targeted website. Legitimate customers can not access the website and the company loses revenue and credibility with their customers who may also sue the targeted company for loss of service during attack. Use of Website as a backdoor into the company network to steal data, plant viruses, etc.

15 Insider and Privilege Misuse to Guard Against in Your Business Any unapproved or malicious use of your organizational resources Too many people in your company have access to too much data Limit access and change passwords frequently to help mitigate insider threats

16 Miscellaneous Errors by Your Employees Incidents where unintentional actions directly compromised a security attribute of an information asset-e.g., phishing to get passwords from unsuspecting and/or untrained employees Target breach was due to air conditioning vendor gaining access to privileged information and planting a back door into the system for later retrieval of customer data took several months to get the data There are now huge networks of hackers working in teams to gain access to high value systems- anyone can buy hacking software on the Internet and make a good living from their grandmother s basement (aka script kiddies mostly having fun) but most big jobs are for big financial payoffs from Russia and places where the FBI can t operate until it s too late

17 Crimeware Any malware incident that did not fit other patterns like espionage or POS (Point of Sale) attacks Covers a wide variety of incidents involving malware of various types and purposes

18 Payment Card Skimmers Involves POS skimming devices physically placed on or near devices that read credit card magnetic strips to accept payment ATMs, gas pumps, POS terminals are big sources of hidden (implanted) credit card magnetic strip readers Placed by someone like a maintenance worker, employee or hacker and usually removed at a later date to avoid detection Hackers walk around stores like Walmart or sit in restaurants with skimmers that work when they are there and are not found by anyone making a search

19 Cyber-Espionage Defined as unauthorized network or system access linked to stateaffiliated hackers and/or exhibiting the motive of espionage Usually hard core criminal organizations operating in Russia and East Europe where the FBI can t get at them They target corporations, governments, NGO s, etc., but also small to medium businesses as well to steal personal data, trade secrets, government secrets, etc.

20 Physical Theft and Loss Missing assets containing sensitive data Laptops, ipads, thumb drives left in unlocked cars, restaurants, etc. Can include paper assets left in cars, boxes of paper data in storage lockers, etc.

21 Key Questions for all owners and C-suite personnel who must manage financial risk How much personal data do you store on employees, customers, clients, etc.? What is your plan for minimizing your risk of losing sensitive data? How much can you afford to spend on penalties and lawsuits in the event of a data breach that gets traced back to your company?

22 Key Questions cont. What would happen if customer and employee private information is stolen from your company? How many paper and electronic records containing sensitive information do you have stored (file cabinets, storage sheds, PCs) Do you have written agreements (contract liability) concerning privacy and protection of data with outside vendors? Document storage and destruction, janitorial, air conditioning, etc., etc.

23 Key Questions cont. What type of social media is your business using? Are their restrictions to its administration? Risks include invasion of privacy, copyright and trademark liability, defamation and slander-usually covered by other liability insurance policies Are you aware of the exclusions in your existing P&C and GL policies? Most cyber liability claims such as social media liabilities, electronic data and cost to recreate, outages caused by viruses or hackers will not be covered under existing policies Are you aware of the most recent privacy and data breaches in your industry for evaluation of your potential risks? Good sources of information pertinent to your industry can be found on Google or privacyrights.org (an excellent database of actual breaches)

24 Key Questions cont. Are you aware that the average 1 st party cost for a data breach claim is $206 per record Costs include notification and credit monitoring for customers as well as public relations and call centers Are you familiar with all state regulations that you do business in (not just your home state) for notification in the event of a privacy breach? Look on for state regulations

25 Key Questions cont. Do any of your employees access your system from a mobile device? The Ponemon study shows that 81% of employees have access to PII (Personally Identifiable Information) on ipads, smart phones and employee laptops the is referred to as the BYOD (Bring your own device) problem Have you considered the Third-Party costs to your business in the event of a Privacy Breach? Intellectual property infringement, reputation injury, customer s systems being unavailable and the cost to defend your business against numerous lawsuits 50% of small to medium businesses shut down after a major breach if they can t cover the expense (Target is self insured are you?)

26 Questions from a typical Cyber Liability Questionnaire for an insurance quote 1. Do you control who has access to your computer network? 2. Do you have a firewall between your information system and the Internet? 3. Do you have firewall protections on each of your individual workstations? 4. Do you have a virus protection program in place? 5. Do you outsource any part of your internal networking/computer system or Internet access to others? 6. Do you have a person responsible for IT security?

27 Typical quote questions cont. 7. Does your hiring process include criminal background checks? 8. Do you have a written security policy that covers both physical (premise) and information security? 9. Do you test your policy s security or privacy controls? 10. Have you ever experienced a privacy or data breach? 11. Do you allow employees to download personal client information or other confidential information onto laptops or other data files? (If yes, is the data encrypted?)

28 Typical quote questions cont. 12. What personal client or employee information is held in your company s information system or employee devices? Social Security Numbers Driver s License Numbers Financial Account Numbers Credit Card Numbers Personal Health Information Customer Information Other (please specify) don t hide anything so that you get a realistic quote that represents your real risk 13. Have you ever filed a Privacy/Data Breach claim? (If yes, please note date of incident and provide brief explanation)

29 Why Get a Quote (or several quotes)? It doesn t cost anything to have a qualified insurance agent prepare a quote for your cyber liability insurance needs By getting quotes from several insurance carriers you will get the expertise of several underwriters who can help you navigate the complex waters of cyber liability insurance, which is still in its early phase of development Before or after you get a quote for cyber liability insurance have a qualified outside security expert do an evaluation of your physical and network security system and provide a written report that can be passed on to the insurance agent and his underwriters for proper evaluation of your premium and coverage requirements

30 10 Reasons to buy Cyber Liability Insurance 1. High cost of breach notification in the event of a breach 2. Loss of third-party (your customers and employees) data results in class action lawsuits that can put you out of business if you aren t protected by cyber liability insurance 3. The data in your network is not covered by standard commercial property & casualty policies yet it is the most valuable asset you have (how much to replace lost or stolen data versus the cost to replace a computer network?) 4. Information Systems (IT systems) are critical to operating your day to day business but their downtime is not usually covered by standard business policies-check your current policy

31 10 Reasons to Buy cont. 5. Cyber crime is the fastest growing crime in the world, but most attacks are not covered by standard commercial insurance policies 6. Retailers face severe penalties if they lose their customer credit card data Global credit card crime is worth over $7.5billion and this risk is increasingly being transferred from the credit card service providers to the business owners Retailers can be held liable for forensic investigation costs, credit card reissuance costs and the actual fraud (purchases) conducted on stolen cards Cyber liability insurance can offset many of these costs

32 10 Reasons to Buy cont. 7. Your reputation is your number one asset, so why not insure it? Cyber liability insurance can insure your reputation in the event of a cyber security breach It can pay for costs of engaging a PR firm to help restore your reputation, but also for the loss of future sales that arise as a direct result of customers switching to your competitors You can t claim that a cyber breach is not your fault and therefore you should not have to bear the expense you are the one your customers and government agencies will hold liable no matter the cause of the breach 8. Social media usage is at an all time high and claims are on the rise Cyber liability insurance can help provide coverage for claims arising from leaked information, defamatory statements or copyright infringements

33 10 Reasons to Buy cont. 9. Portable devices increase the risk of loss or theft of information Cyber liability insurance can cover the costs associated with a data breach should a portable device be lost, stolen or fall victim to a virus 10. It s not just big businesses being targeted by hackers, but lots of small ones too, often part of a massive hack attack Hackers often practice on many small businesses to learn the techniques and pathways into the larger businesses. The small businesses suffer the same damage as the large ones A third of global cyber attacks were aimed at businesses with less than 250 employees

34 Cyber Liability Risk Applies to all sectors of the e-commerce and Internet world e-professionals those who provide traditional services over the Internet Information Technology (Internet) Professionals website developers, systems/computer consultants, etc. E-Commerce Companies companies existing only on the net, clicks & mortar companies, and content providers such as portals, search engines and specialty providers of content Internet Advertisers traditional organizations utilizing the Internet for marketing

35 Examples of Cyber Liability Claims Extortion 1 Entire database of publicly traded corporation was encrypted by a disgruntle employee Ransom note demanded $1 million for the password to unlock the data The company paid the ransom!!

36 Examples of Cyber Liability Claims Extortion-2 Accounting firm upgrades their computers and scrubs old hard drives before tossing them out Hacker gets ahold of discarded hard drives and restored the data which included financial records of clients Firm bought back the hard drives for $1 million

37 Examples of Cyber Liability Claims Mischievous Hacking Repeated Denial of Service attacks by a hacker have virtually shut down a state s Public Access Network Computer This is an example of mischievous behavior that shuts down an system but there is no ransom involved Hacker typically brags to his friends of his accomplishment

38 Examples of Cyber Liability Claims Mischievous Hacking An Internet Service Provider (ISP) was hacked The hacker planted swastikas and racist messages on web pages while masquerading as the provider s administrator, erased data on two computers and shut down the system The ISP was shut down for 12 hours and files created in the several days prior to the attack were lost

39 Examples of Cyber Liability Claims Loss of Data A personal laptop computer was stolen from a data processing center The laptop contained the account numbers for over 300,000 credit card customers

40 Examples of Cyber Liability Claims Loss of Data A technical instruments manufacturer had a disgruntled employee delete their entire database It cost the company $7.8 million in lost revenues and $3.2 million to replace the lost data

41 Statistics of Cyber Liability Losses 24% of data breaches occur in retail environments and restaurants The average total cost of a cyber security breach is estimated at $5.4 million 50% of small businesses who must bear the cost of a breach are out of business within 6 months There are 46 different state laws and another set of federal laws and regulations governing the collection and storage of data and the prevention and reporting of a breach From Don t be a Cyber-Thief s Next Victim by Leon Silver and Gabe Zorogastua of the Polsinelli Law Firm, Phoenix, AZ

42 Reduction of Cyber Security Losses It takes a team of cyber security consultants, IT experts, insurance, security and law firms to deal with the extensive and increasing cyber threat to US businesses Cyber security concerns are now part of doing business, and general counsel and C-Suite executives must be ready to guide their companies through these complex issues Prevention is the first step to minimizing cyber security liability From Don t be a Cyber-Thief s Next Victim by Leon Silver and Gabe Zorogastua of the Polsinelli Law Firm, Phoenix, AZ

43 Reduction of Cyber Security Losses The following steps can help minimize the cost and likelihood of security breaches: Security measures before a breach Have an incident response plan Establish a strong security infrastructure Appoint a Chief Information Security Officer Cyber-security audits Businesses should conduct regular cyber-security audits and limit access to sensitive data by third parties and employees From Don t be a Cyber-Thief s Next Victim by Leon Silver and Gabe Zorogastua of the Polsinelli Law Firm, Phoenix, AZ

44 Reduction of Cyber Security Losses Cyber-security insurance Businesses should review insurance policies to determine whether and to what extent they are covered for cyber-security threats Encryption If a data breach occurs, encryption can help minimize liability From Don t be a Cyber-Thief s Next Victim by Leon Silver and Gabe Zorogastua of the Polsinelli Law Firm, Phoenix, AZ

45 Notification in the Event of a Breach Health Insurance Portability and Accountability Act (HIPPA) and Health Information Technology for Economic and Clinical Health Act (HITECH) requires covered entities to protect against reasonably anticipated threats or hazards to security The HITECH Act requires covered entities and business associates to notify the individuals whose protected health information was accessed no later than 60 days after the breach was discovered From Don t be a Cyber-Thief s Next Victim by Leon Silver and Gabe Zorogastua of the Polsinelli Law Firm, Phoenix, AZ

46 Notification in the Event of a Breach If the breach affects more than 500 individuals, the law also requires notification within 60 days after the breach was discovered to the US Department of Health and Human Services and the media From Don t be a Cyber-Thief s Next Victim by Leon Silver and Gabe Zorogastua of the Polsinelli Law Firm, Phoenix, AZ

47 Notification in the Event of a Breach Gramm-Leach-Bliley Act requires financial institutions to publicize their privacy policies and establish internal safeguards and procedures to protect consumer information Related guidelines require covered financial institutions to notify customers whose personal information has been subject to unauthorized access or use if misuse of the customer s information has occurred or is reasonably possible, unless law enforcement determines that notification will interfere with a criminal investigation From Don t be a Cyber-Thief s Next Victim by Leon Silver and Gabe Zorogastua of the Polsinelli Law Firm, Phoenix, AZ

48 Notification in the Event of a Breach Securities & Exchange Commission (SEC) has issued guidance stating that publicly traded companies should report certain cyber instances State Law Currently 46 states, the District of Columbia, Puerto Rico, and the Virgin Islands have enacted laws requiring notification of security breaches involving personal information From Don t be a Cyber-Thief s Next Victim by Leon Silver and Gabe Zorogastua of the Polsinelli Law Firm, Phoenix, AZ

49 Potential Litigation Potential claims by private parties and the government include: State-law claims filed under individual states consumer protection laws, tort and contract law, fiduciary requirements, and other cyber security rules FTC Safeguards Rule the FTC has brought numerous enforcement actions to address whether businesses security systems are reasonable and appropriate to protect consumer information From Don t be a Cyber-Thief s Next Victim by Leon Silver and Gabe Zorogastua of the Polsinelli Law Firm, Phoenix, AZ

50 Potential Litigation SEC Enforcement Actions. The SEC s Division of Corporate Finance has taken the position that public companies should disclose their risk of cyber incidents Failure to disclose cyber security breaches or risks could lead to actions on security anti-fraud provisions like Rule 10b-5 or books and records violations under Rule 13b2-2 From Don t be a Cyber-Thief s Next Victim by Leon Silver and Gabe Zorogastua of the Polsinelli Law Firm, Phoenix, AZ

51 Do You Really Need Cyber Liability Insurance? LinkedIn, eharmony, DropBox, Paypal and Yahoo have all been hacked and millions of customer records have been lost This list does not even include the big retailers like Target and Home Depot that have been hacked with hundreds of thousands of credit card data lost Liability for loss of customer data or employee data is not typically covered under normal corporate insurance policies From Do You Really Need Cyber Liability Insurance?, white paper from ManageEngine

52 Do You Really Need Cyber Liability Insurance? Be careful when evaluating your existing business insurance policy since some policies that offer general liability coverage and directors and officers liability may provide some limited cyber liability coverage but may not provide all that is required Analyze your existing policy in detail with the help of experts before you have a cyber breach because after the breach it is too late A recent survey by the Chubb Group of Insurance Companies found that 65% of public companies forego cyber insurance even though they consider cyber risk as their number one concern From Do You Really Need Cyber Liability Insurance?, white paper from ManageEngine

53 Do You Really Need Cyber Liability Insurance? 25% of those companies surveyed are expecting a cyber breach in the coming year and 71% have cyber breach response plans in place but only 35% have cyber liability insurance It is not only high-profile and high-risk companies that are at risk of cyber breaches Small to medium sized companies are at equal risk of cyber breaches 72% of all data breaches occurred in Small to Medium (SMB) businesses according to studies by the Secret Service and Verizon Communications Inc. From Do You Really Need Cyber Liability Insurance?, white paper from ManageEngine

54 Do You Really Need Cyber Liability Insurance? So why do only 35% of companies invest in cyber liability insurance? For one, many executives don t know it exists, and even if they do they probably don t think an attack will happen to them, or they are not overly worried about the potential fallout of such a breach Premiums are still high since so few companies are buying cyber liability insurance and the payouts can be in the millions of dollars The premiums for e-commerce companies are high because these companies are considered high risk since they acquire and store large amounts of credit card data for purchases from their site From Do You Really Need Cyber Liability Insurance?, white paper from ManageEngine

55 Do You Really Need Cyber Liability Insurance? The other high risk companies are medical related institutions hosting data, such as date of birth information, social security numbers and medical records You can reduce your cyber liability premiums by reinforcing your security practices before you apply-like a good driver discount In other words, having a lower risk factor for data breaches lowers your insurance premium One easy way to lower your risk of a data breach is to have strong password protection on your system by using encryption and changing passwords regularly From Do You Really Need Cyber Liability Insurance?, white paper from ManageEngine

56 Do You Really Need Cyber Liability Insurance? When your system consists of multiple units of servers, apps, cloud services, databases, tablets and laptops you can purchase affordable password management solutions to help offset the cost of cyber liability premiums Other actions that can reduce the cost of cyber liability premiums are: Regular risk assessments by outside cyber security analysts A written cyber security policy that identifies and lists critical assets and defines policies for physical security, account management, and backup and recovery of critical data among other areas Leverage firewalls, virtual private networks, anti-virus and anti-spam software and secure mobile solutions to secure network access and mobile devices From Do You Really Need Cyber Liability Insurance?, white paper from ManageEngine

57 Types of Commercial Liability Insurance Don t Expect Your Existing Commercial General Liability Insurance to Cover Cyber Liability Losses! Commercial General Liability (GL) Coverage Exclusions (aka, will not pay!): Personal and Advertising Injury Electronic Data applies to damages arising out of the loss of use of, damage to, corruption of, inability to access, or inability to manipulate electronic data Illegal Distribution applies to telemarketing and anti-spam laws

58 Now that you know the potential threat to your business due to cyber attacks it s time to take action!! Click the Quote Request Button and let me get you several quotes from reputable insurance companies to protect you from extensive financial losses due to cyber attacks on your company. The cyber liability policy can be standalone or combined with the rest of your business insurance. John Buck, Cyber Liability Insurance Specialist RP Ryan Insurance Inc N 40 th St Suite 102 Phoenix AZ Phone: x 252 Cell: jbuck@rpryan.com

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Data Breach Cost. Risks, costs and mitigation strategies for data breaches Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,

More information

10 Smart Ideas for. Keeping Data Safe. From Hackers

10 Smart Ideas for. Keeping Data Safe. From Hackers 0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000

More information

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former

More information

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Jeremy Ong Divisional Vice-President Great American Insurance Company November 13, 2010 1 Agenda Overview of data breach statistics

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies

More information

Cyber Threats: Exposures and Breach Costs

Cyber Threats: Exposures and Breach Costs Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals

More information

YOUR TRUSTED PARTNER IN A DIGITAL AGE. A guide to Hiscox Cyber and Data Insurance

YOUR TRUSTED PARTNER IN A DIGITAL AGE. A guide to Hiscox Cyber and Data Insurance YOUR TRUSTED PARTNER IN A DIGITAL AGE A guide to Hiscox Cyber and Data Insurance 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and

More information

Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com

Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com Data Security 101 A Lawyer s Guide to Ethical Issues in the Digital Age Christopher M. Brubaker cbrubaker@clarkhill.com November 4-5, 2015 Pennsylvania Bar Institute 21 st Annual Business Lawyers Institute

More information

Updates within Network Security and Privacy Risk Management

Updates within Network Security and Privacy Risk Management Updates within Network Security and Privacy Risk Management RIMS Minneapolis Meeting Melissa Krasnow, Partner, Dorsey & Whitney LLP (Minneapolis, MN) Mario Paez, Midwest Practice Leader for Tech., Privacy,

More information

Cyber Exposure for Credit Unions

Cyber Exposure for Credit Unions Cyber Exposure for Credit Unions What it is and how to protect yourself L O C K T O N 2 0 1 2 www.lockton.com Add Cyber Title Exposure Here Overview #1 financial risk for Credit Unions Average cost of

More information

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you

More information

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Are you exposed to CyberRisk? Like nearly every other business, you have likely capitalized on the advancements in technology today

More information

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system

More information

Data Breach and Senior Living Communities May 29, 2015

Data Breach and Senior Living Communities May 29, 2015 Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs

More information

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures

More information

Cybersecurity: Protecting Your Business. March 11, 2015

Cybersecurity: Protecting Your Business. March 11, 2015 Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks

More information

cyber invasions cyber risk insurance AFP Exchange

cyber invasions cyber risk insurance AFP Exchange Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance

More information

ISO? ISO? ISO? LTD ISO?

ISO? ISO? ISO? LTD ISO? Property NetProtect 360 SM and NetProtect Essential SM Which one is right for your client? Do your clients Use e-mail? Rely on networks, computers and electronic data to conduct business? Browse the Internet

More information

APPLICATION FOR TECHNOLOGY & PRIVACY PROFESSIONAL LIABILITY

APPLICATION FOR TECHNOLOGY & PRIVACY PROFESSIONAL LIABILITY APPLICATION FOR TECHNOLOGY & PRIVACY PROFESSIONAL LIABILITY GENERAL INFORMATION 1. APPLICANT NAME: 2. PHONE: 3. MAILING ADDRESS: 4. WEB ADDRESS: 5. The following officer of the Applicant is designated

More information

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET

DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET 2014 NSGA Management Conference John Webb Jr., CIC Emery & Webb, Inc. Inga Goddijn, CIPP/US Risk Based Security, Inc. Not just a big business problem

More information

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in

More information

CYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014

CYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014 CYBER LIABILITY Network Security and Privacy Bring on tomorrow May 15, 2014 1 AGENDA I. Identify Exposures II. Identify how a breach can occur III. The Coverage (Third Party Liability + First Party Losses)

More information

CYBER RISK SECURITY, NETWORK & PRIVACY

CYBER RISK SECURITY, NETWORK & PRIVACY CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread

More information

Discussion on Network Security & Privacy Liability Exposures and Insurance

Discussion on Network Security & Privacy Liability Exposures and Insurance Discussion on Network Security & Privacy Liability Exposures and Insurance Presented By: Kevin Violette Errors & Omissions Senior Broker, R.T. Specialty, LLC February, 25 2014 HFMA Washington-Alaska Chapter

More information

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider 1 Cyber/Information Security Insurance Pros / Cons and Facts to Consider 2 Presenters Calvin Rhodes, Georgia Chief Information Officer Ron Baldwin, Montana Chief Information Officer Ted Kobus, Partner

More information

Privacy Rights Clearing House

Privacy Rights Clearing House 10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights

More information

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President

More information

PCI Compliance for Healthcare

PCI Compliance for Healthcare PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?

More information

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

Cybercrime: Protecting Your Digital Assets in Today's Threat Landscape

Cybercrime: Protecting Your Digital Assets in Today's Threat Landscape Cybercrime: Protecting Your Digital Assets in Today's Threat Landscape Presented by Rachel Ratcliff OM03 Saturday, 10/5/2013 9:30 AM - 10:45 AM Cybercrime: Protecting Your Digital Assets in Today s Threat

More information

INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES

INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES NOTICE: INSURING AGREEMENTS I.A., I.C. AND I.D. OF THIS POLICY PROVIDE COVERAGE ON A CLAIMS MADE AND REPORTED BASIS AND APPLY ONLY

More information

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

INFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE. I. GENERAL INFORMATION Full Name:

INFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE. I. GENERAL INFORMATION Full Name: INFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE NOTICE: COVERAGE UNDER THIS POLICY IS PROVIDED ON A CLAIMS MADE AND REPORTED BASIS AND APPLIES ONLY TO CLAIMS FIRST MADE

More information

Preparing for the HIPAA Security Rule

Preparing for the HIPAA Security Rule A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions

More information

Cyber/ Network Security. FINEX Global

Cyber/ Network Security. FINEX Global Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over

More information

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Cyber Insurance: How to Investigate the Right Coverage for Your Company 6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)

More information

The Top Ten of Information Security - For 2015

The Top Ten of Information Security - For 2015 7 th Annual Information Security Summit The Executive Forum Information Security Management Overview June 4, 2015 Copyright 2015. Citadel Information Group. All Rights Reserved. 2 Establishing Leadership.

More information

Joe A. Ramirez Catherine Crane

Joe A. Ramirez Catherine Crane RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract

More information

Cyber and Data Security. Proposal form

Cyber and Data Security. Proposal form Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which

More information

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Lloyd s of London (Reuters) May 8, 2000 Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Rivers Casino, Pittsburgh November 17, 2014

More information

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd Lessons Learned from Recent HIPAA and Big Data Breaches Briar Andresen Katie Ilten Ann Ladd Recent health care breaches Breach reports to OCR as of February 2015 1,144 breaches involving 500 or more individual

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Pam Townley, AVP / Eastern Zonal Manager AIG Professional Liability Division Jennifer Bolling, Account Executive Gallagher Management Liability Division

More information

FACT SHEET: Ransomware and HIPAA

FACT SHEET: Ransomware and HIPAA FACT SHEET: Ransomware and HIPAA A recent U.S. Government interagency report indicates that, on average, there have been 4,000 daily ransomware attacks since early 2016 (a 300% increase over the 1,000

More information

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches

More information

Information Security Addressing Your Advanced Threats

Information Security Addressing Your Advanced Threats Information Security Addressing Your Advanced Threats Where We are Going Information Security Landscape The Threats You Face How To Protect Yourself This Will Not Be Boring What Is Information Security?

More information

Managing Cyber & Privacy Risks

Managing Cyber & Privacy Risks Managing Cyber & Privacy Risks NAATP Conference 2013 NSM Insurance Group Sean Conaboy Rich Willetts SEAN CONABOY INSURANCE BROKER NSM INSURANCE GROUP o Sean has been with NSM Insurance Group for the past

More information

CYBER SECURITY SPECIALREPORT

CYBER SECURITY SPECIALREPORT CYBER SECURITY SPECIALREPORT 32 The RMA Journal February 2015 Copyright 2015 by RMA INSURANCE IS AN IMPORTANT TOOL IN CYBER RISK MITIGATION Shutterstock, Inc. The time to prepare for a potential cyber

More information

LIGC-ACC Presentation November 9, 2015

LIGC-ACC Presentation November 9, 2015 Bryan Frank, DDIS Info Sec Corp, panelist Jennifer M. Mone, Deputy General Counsel, Hofstra University, panelist Keith J. Frank, Partner, Forchelli, Curto, Deegan, Schwartz, Mineo & Terrana,. LLP, moderator

More information

How To Buy Cyber Insurance

How To Buy Cyber Insurance 10-26-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)

More information

Cyber-insurance: Understanding Your Risks

Cyber-insurance: Understanding Your Risks Cyber-insurance: Understanding Your Risks Cyber-insurance represents a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some

More information

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature Demystifying Cyber Insurance Jamie Monck-Mason & Andrew Hill Introduction What is cyber? Nomenclature 1 What specific risks does cyber insurance cover? First party risks - losses arising from a data breach

More information

I ve been breached! Now what?

I ve been breached! Now what? I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have

More information

NZI LIABILITY CYBER. Are you protected?

NZI LIABILITY CYBER. Are you protected? NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is

More information

INFORMATION SECURITY & PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY APPLICATION

INFORMATION SECURITY & PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY APPLICATION INFORMATION SECURITY & PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY APPLICATION NOTICE: COVERAGE UNDER THIS POLICY IS PROVIDED ON A CLAIMS MADE AND REPORTED BASIS AND APPLIES ONLY TO CLAIMS FIRST

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

Cybersecurity Workshop

Cybersecurity Workshop Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153

More information

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security

More information

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING

More information

Information Security for the Rest of Us

Information Security for the Rest of Us Secure Your Way Forward. AuditWest.com Information Security for the Rest of Us Practical Advice for Small Businesses Brian Morkert President and Chief Consultant 1 Introduction President Audit West IT

More information

Is the PCI Data Security Standard Enough?

Is the PCI Data Security Standard Enough? Is the PCI Data Security Standard Enough? By: Christina M. Freeman ICTN 6870 Advanced Network Security Abstract: This paper will present the researched facts on Payment Card Industry Data Security Standard

More information

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015 SMB Data Breach Risk Management Best Practices By Mark Pribish February 19, 2015 Presentation Agenda About Mark Pribish Information Governance The Threat Landscape Data Breach Trends Legislative and Regulatory

More information

2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage

2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage 2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage Chris Reese Vice President, Director of Underwriting Connie Rivas Asst. Vice President, Contracts and

More information

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor Cyber Risks Management Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor 1 Contents Corporate Assets Data Breach Costs Time from Earliest Evidence of Compromise to Discovery of Compromise The Data Protection

More information

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become

More information

Cyber and data Policy wording

Cyber and data Policy wording Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and

More information

The Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016

The Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016 The Future of Data Breach Risk Management Response and Recovery Increasing electronic product life and reliability The Cybersecurity Forum April 14, 2016 Today s Topics About Merchants Information Solutions,

More information

Enterprise PrivaProtector 9.0

Enterprise PrivaProtector 9.0 IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS

More information

Desktop and Laptop Security Policy

Desktop and Laptop Security Policy Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious

More information

Managing Cyber Risk through Insurance

Managing Cyber Risk through Insurance Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes

More information

How To Protect Yourself From Cyber Threats

How To Protect Yourself From Cyber Threats Cyber Security for Non- Profit Organizations Scott Lawler CISSP- ISSAP, ISSMP, HCISPP Copyright 2015 LP3 May 2015 Agenda IT Security Basics e- Discovery Compliance Legal Risk Disaster Plans Non- Profit

More information

Cyber-Crime Protection

Cyber-Crime Protection Cyber-Crime Protection A program of cyber-crime prevention, data breach remedies and data risk liability insurance for houses of worship, camps, schools, denominational/association offices and senior living

More information

Cyber Risk Insurance for Agents. Frequently Asked Questions

Cyber Risk Insurance for Agents. Frequently Asked Questions Cyber Risk Insurance for Agents Frequently Asked Questions 1 Cyber Risk Insurance About Great American Insurance Great American Insurance Group s roots go back to 1872 with the founding of its flagship

More information

Cybercrime: risks, penalties and prevention

Cybercrime: risks, penalties and prevention Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

More information

Collateral Effects of Cyberwar

Collateral Effects of Cyberwar Your texte here. Collateral Effects of Cyberwar by Ilia Kolochenko for Geneva Information Security Day 9 th of October 2015 Quick Facts and Numbers About Cybersecurity In 2014 the annual cost of global

More information

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS The following claim scenarios are hypothetical and are offered solely to illustrate the types of situations that may result in claims. Although sorted by industry,

More information

Privacy / Network Security Liability Insurance Discussion. January 30, 2013. Kevin Violette RT ProExec

Privacy / Network Security Liability Insurance Discussion. January 30, 2013. Kevin Violette RT ProExec Privacy / Network Security Liability Insurance Discussion January 30, 2013 Kevin Violette RT ProExec 1 Irrefutable Laws of Information Security 1) Information wants to be free People want to talk, post,

More information

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc. Payment Card Industry Data Security Standard Training Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc. March 27, 2012 Agenda Check-In 9:00-9:30 PCI Intro and History

More information

Coverage is subject to a Deductible

Coverage is subject to a Deductible Frank Cowan Company Limited 75 Main Street North, Princeton, ON N0J 1V0 Phone: 519-458-4331 Fax: 519-458-4366 Toll Free: 1-800-265-4000 www.frankcowan.com CYBER RISK INSURANCE DETAILED APPLICATION Notes:

More information

$22k. Payment Card Data Breaches: What You Need to Know About Your Risk and Liability. First Data Market Insight

$22k. Payment Card Data Breaches: What You Need to Know About Your Risk and Liability. First Data Market Insight Need to Know About Your Risk and Liability Many small merchants are surprised to learn that they can be held liable for tens of thousands of dollars in fines and other expenses when a card data breach

More information

ACE Advantage PRIVACY & NETWORK SECURITY

ACE Advantage PRIVACY & NETWORK SECURITY ACE Advantage PRIVACY & NETWORK SECURITY SUPPLEMENTAL APPLICATION COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY AND/OR NETWORK SECURITY LIABILITY COVERAGE. Please submit with

More information

CSR Breach Reporting Service Frequently Asked Questions

CSR Breach Reporting Service Frequently Asked Questions CSR Breach Reporting Service Frequently Asked Questions Quick and Complete Reporting is Critical after Data Loss Why do businesses need this service? If organizations don t have this service, what could

More information

How-To Guide: Cyber Security. Content Provided by

How-To Guide: Cyber Security. Content Provided by How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses

More information

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection Page 1 of 5 Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such an alarming rate and business is more and more reliant on IT

More information

plantemoran.com What School Personnel Administrators Need to know

plantemoran.com What School Personnel Administrators Need to know plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of

More information

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime? Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies

More information

Reducing Cyber Risk in Your Organization

Reducing Cyber Risk in Your Organization Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than

More information

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029 Cyber Liability Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029 Today s Agenda What is Cyber Liability? What are the exposures? Reality of a

More information

Computer Security at Columbia College. Barak Zahavy April 2010

Computer Security at Columbia College. Barak Zahavy April 2010 Computer Security at Columbia College Barak Zahavy April 2010 Outline 2 Computer Security: What and Why Identity Theft Costs Prevention Further considerations Approach Broad range of awareness Cover a

More information

Cyber Risks and Insurance Solutions Malaysia, November 2013

Cyber Risks and Insurance Solutions Malaysia, November 2013 Cyber Risks and Insurance Solutions Malaysia, November 2013 Dynamic but vulnerable IT environment 2 Cyber risks are many and varied Malicious attacks Cyber theft/cyber fraud Cyber terrorism Cyber warfare

More information

How To Cover A Data Breach In The European Market

How To Cover A Data Breach In The European Market SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand

More information

Cyber Liability & Data Breach Insurance Claims

Cyber Liability & Data Breach Insurance Claims Cyber Liability & Data Breach Insurance Claims A Study of Actual Payouts for Covered Data Breaches Mark Greisiger President NetDiligence June 2011 Last year, privacy breaches ran about 1-2 per week. This

More information

THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill

THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill THE ANATOMY OF A CYBER POLICY Jamie Monck-Mason & Andrew Hill What s in a name? Lack of uniformity in policies: Cyber Cyber liability Data protection Tech PI The scope of cyber insurance First party coverage

More information

How to Practice Safely in an era of Cybercrime and Privacy Fears

How to Practice Safely in an era of Cybercrime and Privacy Fears How to Practice Safely in an era of Cybercrime and Privacy Fears Christina Harbridge INFORMATION PROTECTION SPECIALIST Information Security The practice of defending information from unauthorised access,

More information