Aon & DLA Piper s 2014 Network Security & Privacy Symposium. September 2014
|
|
|
- Myron Brian Short
- 10 years ago
- Views:
Transcription
1 Aon & DLA Piper s 2014 Network Security & Privacy Symposium September 2014
2 2014 Aon Corporation Australia Limited ABN Kevin Kalinich Global Cyber Leader Aon Risk Solutions
3 Network Security & Privacy Exposures and Insurance Solutions 1 Cyber Exposure Trends a) Increase in Dependence on Technology & Information Assets b) Magnitude & Frequency of Losses c) Evolving Nature of Cyber Risks in Australia 2 Cyber Risk Mitigation a) Risk Mitigation Best Practices b) Australia Privacy Act Amendments Compliance c) IT Vendor Management 3 Gaps in Existing Coverage a) General Liability b) Property c) Professional Liability d) Crime /EPLI 4 Cyber Insurance a) Coverage Terms & Conditions b) Exclusions c) Limits and Benchmarking 5 Key Takeaways a) Financial Statement Impact & Protection b) Reports to Management (It is a Board of Directors issue) c) Functions can be outsourced, but legal liability cannot be completely outsourced d) Collaboration of Organisation s Departments 2
4 April 2014 World Wide Web 25 Year Anniversary Timeline of the World Wide Web 3
5 When we say Network Risk, what do we mean? Personal information, intellectual property losses and operational outages mean material financial and reputational damage. However, Stuxnet was a game changer it proved that physical property losses are possible through cyber means 4
6 What is Network Security & Privacy for Risk Managers? 5
7 Emerging Network Security & Privacy Risks Social Media Two distinct sources of risk: corporate and employee activity Network Security, Privacy. Social Engineering Defamation, product disparagement, IP infringement, harassment, and invasion of privacy. Mobile Device Payment Apps Mobile payment hardware, software, and mobile wallet technology is exploding globally Juniper Research study predicts mobile transactions will hit $1.3 trillion worldwide by 2015 PCI Council guidance addresses account data security, mobile devices; hardware, software, usage, and customer relationship How is risk affected for all participants in the payment value chain? Mobile payments for online purchases predicted to skyrocket from $18 B (2012) to $117 B (2017) according to WorldPay Cloud Computing What are the risk oversight and security controls of the cloud provider? Where will the data be stored and will the provider make a contractual commitment to obey privacy laws? How is our data segregated from other data? How can I recover my data if disaster strikes? What if the provider goes out of business? How can I get my data back? How is liability allocated? Internet of Things Telematics, Device data collection, and location tracking, GPS. International Laws and Regulations Big Data Analytics 6
8 2014 Developments Australian Privacy Principles (March 2014), BUT no mandatory data breach notification Australian Bureau of Statistics $7 MM security breach prompts insider trading charges (May 2014) Apple device hijacking urges Australia icloud accounts to change passwords (May 2014) ¾ Australians say data breaches at banks & credit card companies concern them (Unisys) & 72% would never use breached entity (SafeNet July 2014) Australian daily deals site disclosed 2011 data breach after 3 years ( Catch of the Day ) Telstra fined $10K & warned over 16,000 customer privacy breach (March 2014) August 2014: 1.2 billion user names & passwords hacked by Russian crime ring 40% of Asian companies report significant economic losses from data breaches (Economist Intelligence Unit July 2014) October 2011 SEC Guidelines Re Cyber Risks Shareholder Derivative Actions Against Target Corp (2014), Heartland Payment Systems (2008), TJX settled 2010) and Wyndham Worldwide (2014) D s & O s Target Corp. $200 MM+ loss estimate to date SEC Commissioner, June 10, 2014: Boards that choose to ignore, or minimise, the importance of cyber security responsibility do so at their own peril. National Institute of Standards and Technology s Framework for Improving Critical Infrastructure EU delay of Data Privacy Directive Amendments 7
9 Cyber Exposure Trends : Breakdown of Data Breach Expenses 8
10 Catastrophic Breach Model 9
11 Global Cost of an average Data Breach $7.0 $250 Millions $6.0 $5.0 $4.0 $3.0 $2.0 $1.0 $200 $150 $100 $50 Total Cost Response Costs Lost Business Cost per Record $- $- 10
12 Cyber Exposure Trends : Cost of a Breach We ignore the risks that are hardest to measure, even when they pose the greatest threats to our well-being Nate Silver The Signal And The Noise: Why So Many Predictions Fail But Some Don t Review Applicable FI Cyber Losses Peer Benchmarking Monte Carlo Simulations Financial Impact Options Risk Acceptance Risk Avoidance Risk Retention Risk Transfer Contractual Allocation Cyber Insurance Risk mitigation is key in all cases Board of Directors Liability? Integrate with Enterprise Risk Management 11
13 When we say Network Risk, what do we mean? 12
14 13
15 14
16 Wait isn t this already covered? Property Insurance Malware and Denial-of-Service attacks do not constitute physical perils and do not damage tangible property Malpractice/E&O/PI Unauthorised access exclusions Requires negligence in provision of defined business activities Generally no cover for information commissioner regulatory actions Common Hurdles Intentional acts and insured versus insured issues No coverage for expensive risks expenses required by Law or to protect reputation General Liability Insurance CGL Privacy coverage limited to publication or utterance resulting in one of traditional privacy torts Crime Coverage Crime policies require intent theft of money, securities or tangible property 15
17 Insurance Services Office (ISO) 2013/ : Bars coverage for Telephone Consumer Protection Act (TCPA) claims 2013: Bars coverage for the violation of a federal, state or local statute that addresses, prohibits, or limits the printing, dissemination, disposal, collecting, recording, sending, transmitting, communicating or distribution of material or information (effective May 2014) (Revisions to General Liability Standard Form): This insurance does not apply to: Access or Disclosure of Confidential or Personal Information "Personal and advertising injury" arising out of any access to or disclosure of any person's or organisation's confidential or personal information, including patents, trade secrets, processing methods, customer lists, financial information, credit card information, health information or any other type of non public information. This exclusion applies even if damages are claimed for notification costs, credit monitoring expenses, forensic expenses, public relations expenses or any other loss, cost or expense incurred by you or others arising out of any access to or disclosure of any person's or organisation's confidential or personal information. 16
18 Would you like to litigate for cover? Zurich v. Sony Declaratory Judgment Action verdict: NO COVERAGE UNDER GL, February 21, 2014: Direct costs to companies impacted by cyber breaches, such as forensics, notification, credit monitoring and public relations costs, are basic costs we would cover under our Zurich Security and Privacy Protection policy, says Zurich. Then if a claim is filed, we have a liability coverage part that would cover the affected entity for defense costs and indemnity they have to pay out as a result. State National Insurance Co. v. Global Payments April 2013 $84 Million Declaratory Judgment Action regarding excess Professional Liability policy: Card association claims do not arise out of negligence from professional services or technology-based services Hartford v. Crate & Barrel and Children s retail Stores (Declaratory Judgment Action with respect to GL Policy): Colorado Casualty Insurance Company vs. Perpetual Storage and the University of Utah (GL Policy) -- Negligence suit against insurance broker for not placing proper coverage Tornado Technologies Inc. v. Quality Control Inspection, Inc. (Ohio Ct. App. August 2, 2012) no negligence of insurer for not warning insured to purchase special cyber policy Retail Ventures v. National Union Fire Ins. (August 23, 2012) Crime Policy Endorsement Applies ( Lone Star Bank v. Heartland Payment (Sept. 2013) Breached entity liable to third parties under negligence Eyeblaster v. Federal Ins (8th Cir 2010) Coverage under E & O for negligent software CNA v. HIAR (September, 2013) TCPA damages covered under GL as not a fine Liberty v. Schnucks (Aug, 2013) Declaratory Judgment denying potential $80 MM breach under CGL (dropped Oct 2013) Hartford v. Corcino (Oct. 7, 2013) GL Advertising Injury triggered by medical information breach Abercrombie & Fitch Co v. ACE EUROPEAN GROUP, LIMITED (S.D. Ohio 2013) Cyber policy covers consumer protection claim Safety National Casualty Corp. v. Michaels Stores (June 18, 2014) Declaratory judgment under CGL regarding failed PIN pad terminals 17
19 Scope of Cyber Insurance coverage 18
20 Cyber Insurance: Major Exclusions Breach of contract (unless liable in absence of a contract) Patent/Trade Secret Return of Fees or Recall Expense Direct Bodily Injury or Property Damage False/Deceptive Advertising Known network security vulnerabilities Unsolicited communication Unauthorised or wrongful collection of information (coverage varies) Breaches or security failures that began prior to retro date Intentional acts or fraud by management Liquidated damages Coupons, discounts, or incentives to Insured s customers System upgrades or repairs Unencrypted Devices/Information 19
21 Before you buy Qualification Quantification Risk Maturity Review Insurability Review What can go wrong? How am I protected? How bad can it be? Will my insurance respond? 20 Aon Cyber Risk Diagnostic Tool
22 Cyber Insurance Optimal Cyber Programme 21
23 Share of Total Cyber Premium by Industry (Aon Data) 22
24 Australian Cyber Insurance Markets Theoretical capacity in MM any one risk 300 Year Gross Written premium 2002 <$75m 2004 $200m 2006 $350m 2010 $600m 2013 ~$1bn = 1/15 th of P&C
25 Cyber Insurance then why 24
26 Cyber Insurance doing what technology cannot The Improved Value Proposition of Cyber Insurance Impact of catastrophic cyber risk transfer capacity is to lower the curve overall 25 Source: Doing What Technology Can t: The Role of Risk Transfer in Effectively Managing Cybersecurity
27 Will a D&O policy cover violation of the revised Australian Privacy Law? Cyber Exposures Checklist for Australian Boards of Directors: September 2014) Cyber Risk: Are Boards the New Target? Directors and officers need to understand how to improve their insurance policy's response to cyber risk. The Risk Manager s Role in Mitigating Cyberrisk 26
28 Alec Christie Partner DLA Piper
29 What has changed since March 2014? Changes to the Privacy Act It's a matter of attitude! Why do I care? The role of Privacy Commissioner Mandatory data breach reporting: not yet, but! Responsibility/liability of Directors and Boards 28
30 Lessons from recent investigations A snapshot of key recent findings Investigations in practice What to do! What not to do! 29
31 Lessons learnt how to prepare your organisation for a potential breach Legal compliance it's a start! In practice roll your sleeves up! Top 5 tips: 1. Understand your unique exposure 2. Understand your potential legal liabilities 3. Internal management 4. Mitigation strategies 5. Insurance? 30
32 Stephen Trickey Financial Services Group National Leader Aon Risk Solutions Jacques Jacobs Partner DLA Piper 2014 Aon Corporation Australia Limited ABN
33 The Australian market landscape Insurer Chubb Zurich Liberty AIG Dual CFC Underwriting Macquarie Underwriting Beazley London Australia Underwriting Allianz Axis ACE Product Cyber Security Network Security Privacy Cyber Insurance CyberEdge Cyber & Privacy Protection Cyber, Privacy & Media erisks Business Protection Beazley Breach Response Cyber Policy Cyber Protect In development In development 32
34 Different sectors, different risks 33
35 Different sectors, different risks NSP Gap Analysis Summary 25% 8% 34% Fully Insured Partially Insured Insurable Excluded 33% 34
36 Gaps in Conventional Insurances 1st Party Data Protection Privacy Risks Network Interruption Cyber Extortion Data Restoration, Recollection, Recreation (Determination and Action) Employee sabotage of Data Virus/ Hacker damage to Data Denial of Service attack Physical damage to Data Only 3rd Party Data Protection Privacy Risks Breach of Personal Information Breach of Corporate Information Outsourcing Liability / Vicarious Liability Contamination of Third Party Data by any unauthorised software, computer code or virus Denial of access to third party data Theft of an access code from the Company s premises Destruction, modification, corruption, damage or deletion of Data Physical theft of the Company s hardware Data disclosure due to a Breach of Data Security Costs and expenses for legal advice and representation in connection with an Investigation Data Administrative Fines Repair of Company / Individuals Reputation Media Content Liability (IP, Plagiarism, defamation, trespassing) Notification Costs Monitoring Costs (with identity theft education and credit file or identity monitoring Property General Liability Crime/ Bond K&R PI Cyber Coverage Provided Coverage Possible For reference and discussion only: policy language and facts of claim will require further analysis No Coverage 35
Managing Cyber Risk through Insurance
Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
Cyber Risks and Insurance Solutions Malaysia, November 2013
Cyber Risks and Insurance Solutions Malaysia, November 2013 Dynamic but vulnerable IT environment 2 Cyber risks are many and varied Malicious attacks Cyber theft/cyber fraud Cyber terrorism Cyber warfare
CYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America
CYBER INSURANCE Cyber Insurance and Gaps in Traditional Insurance Cyber and E&O Team Willis FINEX North America Privacy & Network Security (Cyber) Insurance COVERAGE MODULES Privacy Expense Consumer Notification
GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
CYBER RISK SECURITY, NETWORK & PRIVACY
CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread
How To Cover A Data Breach In The European Market
SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to
Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF
Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF October 9, 2013 1 Cyber Insurance Why? United States Department of Commerce: Cyber Insurance
Cyber Threats and the Insurance Response
Cyber Threats and the Insurance Response Scott Reeves & Laurence Yan Munich Reinsurance Company This presentation has been prepared for the Actuaries Institute 2014 General Insurance Seminar. The Institute
MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS
MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson
How To Protect Your Data From Hackers
Cyber Risk: What you need to know and what you can t afford to ignore! James Johnston Directors' and Officers' Insurance Underwriter Daniel Fletcher Cyber Insurance Underwriter Financial & Specialty Markets
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
Understanding the Business Risk
AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 [email protected] Disclaimer The views expressed
Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature
Demystifying Cyber Insurance Jamie Monck-Mason & Andrew Hill Introduction What is cyber? Nomenclature 1 What specific risks does cyber insurance cover? First party risks - losses arising from a data breach
APIP - Cyber Liability Insurance Coverages, Limits, and FAQ
APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP
ISO? ISO? ISO? LTD ISO?
Property NetProtect 360 SM and NetProtect Essential SM Which one is right for your client? Do your clients Use e-mail? Rely on networks, computers and electronic data to conduct business? Browse the Internet
THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill
THE ANATOMY OF A CYBER POLICY Jamie Monck-Mason & Andrew Hill What s in a name? Lack of uniformity in policies: Cyber Cyber liability Data protection Tech PI The scope of cyber insurance First party coverage
Rogers Insurance Client Presentation
Rogers Insurance Client Presentation Network Security and Privacy Breach Insurance Presented by Matthew Davies Director Professional, Media & Cyber Liability Chubb Insurance Company of Canada [email protected]
Joe A. Ramirez Catherine Crane
RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract
RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION
RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former
Cyber and data Policy wording
Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and
Cybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL
Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL Using Insurance Coverage to Mitigate Cybersecurity Risks To Warranty and Service Contract Businesses Barry Buchman, Partner
Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?
Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for? Authored by Neeraj Sahni and Tim Stapleton Neeraj Sahni is Director, Insurance Channel at Kroll Cyber Investigations
Insuring Innovation. CyberFirst Coverage for Technology Companies
Insuring Innovation. CyberFirst for Technology Companies TECHNOLOGY IS EVERYWHERE. SO ARE THE THREATS. protection that goes well beyond a traditional general liability policy. CyberFirst CyberFirst is
Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd
Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures
PANEL DISCUSSION: Cyber Risk Insurance. 19 March 2015. (Network Security & Privacy Insurance)
PANEL DISCUSSION: Cyber Risk Insurance (Network Security & Privacy Insurance) 19 March 2015 Panelists: Cinzia Altomare, Manager Facultative, Gen Re, Italy Michael Shen, AVP, Liberty Specialty Markets,
Data Privacy, Security, and Risk Management in the Cloud
Data Privacy, Security, and Risk Management in the Cloud Diana S. Hare, Associate General Counsel and Chief Privacy Counsel, Drexel University David W. Opderbeck, Counsel, Gibbons P.C. Robin Rosenberg,
Cyber and Data Security. Proposal form
Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
CYBER/ NETWORK SECURITY
CYBER/ NETWORK SECURITY FINEX AUSTRALIA ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over
Cyberinsurance: Insuring for Data Breach Risk
View the online version at http://us.practicallaw.com/2-588-8785 Cyberinsurance: Insuring for Data Breach Risk JUDY SELBY AND C. ZACHARY ROSENBERG, BAKER HOSTETLER LLP, WITH PRACTICAL LAW INTELLECTUAL
What is Cyber Liability
What is Cyber Liability Ubiquitous Warfare Espionage Media Operational Data Security and Privacy Tech 1 Data Security and Privacy Data Breach Response Costs Privacy Regulatory Action Civil Litigation INSURABLE
Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC
Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you
Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler
Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President [email protected] 2 What s at Risk? $300 billion in
Cyber Insurance as one element of the Cyber risk management strategy
Cyber Insurance as one element of the Cyber risk management strategy Stéphane Hurtaud Partner Governance, Risk & Compliance Thierry Flamand Partner Insurance Leader Laurent de la Vaissière Director Governance,
Cyber Insurance Presentation
Cyber Insurance Presentation Presentation Outline Introduction General overview of Insurance About us Cyber loss statistics Cyber Insurance product coverage Loss examples Q & A About Us A- Rated reinsurance
Best practices and insight to protect your firm today against tomorrow s cybersecurity breach
Best practices and insight to protect your firm today against tomorrow s cybersecurity breach July 8, 2015 Baker Tilly Virchow Krause, LLP Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently
Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029
Cyber Liability Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029 Today s Agenda What is Cyber Liability? What are the exposures? Reality of a
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in
Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance
Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance Today s agenda Introductions Cyber exposure overview Cyber insurance market and coverages Captive cyber insurance
Cyber-insurance: Understanding Your Risks
Cyber-insurance: Understanding Your Risks Cyber-insurance represents a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some
Cyber Liability Insurance Data Security, Privacy and Multimedia Protection
Page 1 of 5 Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such an alarming rate and business is more and more reliant on IT
Navigating Cyber Risk Exposure and Insurance. Stephen Wares EMEA Cyber Risk Practice Leader Marsh
Navigating Cyber Risk Exposure and Insurance Stephen Wares EMEA Cyber Risk Practice Leader Marsh Presentation Format Four Key Questions How important is cyber risk and how should we view the cyber threat?
Airmic Review of Recent Developments in the Cyber Insurance Market. & commentary on the increased availability of cyber insurance products GUIDE
Airmic Review of Recent Developments in the Cyber Insurance Market & commentary on the increased availability of cyber insurance products GUIDE 1. Executive summary Airmic members have become increasingly
CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT
CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT INSURANCE COVERAGES FOR TECHNOLOGY COMPANIES This Special Report was written by Daniel P. Hale, J.D., CPCU, ARM, CRM, LIC, AIC, AIS, API. Mr. Hale is Vice President
Cyber Liability Insurance: It May Surprise You
Cyber Liability Insurance: It May Surprise You Moderator Eugene Montgomery, President & CEO Community Financial Insurance Center Panelists Antonio Trotta, Senior Claim Counsel, CNA Specialty William Heinbokel,
Cyber Liability Insurance
Annual Board of Directors Conference 29 April 2014 TOC - 1 The Cyber Risk Landscape 2 Regulation Changes 3 Case Study Why to insure 4 Page 2 The Cyber Risk Landscape 2013 Lloyds Risk Index : Cyber Risk
Cyber Liability Insurance Data Security, Privacy and Multimedia Protection
Page 1 of 5 Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such an alarming rate and business is more and more reliant on IT
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Investment in cyber insurance Lockton Companies
EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND?
EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND? ABOUT JLT SPECIALTY JLT Specialty Insurance Services is the U.S. platform of JLT Group, the leading specialty business adivsory
CYBER-LIABILITY COVERAGE: The $ 45 Million Dollar Exposure
CYBER-LIABILITY COVERAGE: The $ 45 Million Dollar Exposure CYBER-LIABILITY COVERAGE: The $ 45Million Dollar Exposure Today s Presenters: Mark J. Camillo, MBA, BS Head of Network Security and Privacy Products
Cyber and CGL Insurance Coverage for Data Breach Claims
Cyber and CGL Insurance Coverage for Data Breach Claims Paula Weseman Theisen, Partner Data breach overview Definition of data breach/types Data breach costs Data breach legal claims and damages Cyber-insurance
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
Cyber/ Network Security. FINEX Global
Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over
Aon Risk Solutions Global Risk Consulting Captive & Insurance Management. Cyber risk and the captive market - a match made in the cloud?
Aon Risk Solutions Global Risk Consulting Captive & Insurance Management Cyber risk and the captive market - a match made in the cloud? With increasing news coverage of cyber-attacks and despite indications
Cyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become
IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411
IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING
GALLAGHER CYBER LIABILITY PRACTICE. Cyber Risk Exposures and Solutions
GALLAGHER CYBER LIABILITY PRACTICE Cyber Risk Exposures and Solutions Cyber Risk Exposures and Solutions Arthur J. Gallagher & Co. s Cyber Liability Practice has the expertise and the desire to deliver
What would you do if your agency had a data breach?
What would you do if your agency had a data breach? 80% of businesses fail to recover from a breach because they do not know this answer. Responding to a breach is a complicated process that requires the
Tools Conference Toronto November 26, 2014 Insurance for NFP s. Presented by Paul Spark HUB International HKMB Limited
Tools Conference Toronto November 26, 2014 Insurance for NFP s Presented by Paul Spark HUB International HKMB Limited Topics Insurance Policies Basics Directors and Officers Liability Insurance Commercial
Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015
Maritime Insurance Cyber Security Framing the Exposure Tony Cowie May 2015 Table of Contents / Agenda What is cyber risk? Exposures - Should we be concerned about "Cyber"? Is Cyber covered under a Marine
An Introduction to Cyber Liability Insurance. Catherine Berry Senior Underwriter
An Introduction to Cyber Liability Insurance Catherine Berry Senior Underwriter What is cyber risk? Exposures emanating from computer networks and the internet The Cyber Risk Phenomenon The incredible
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Enterprise PrivaProtector 9.0
IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS
Cyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
(1) Commercial Crime Insurance or Employee Fidelity Bond
INSURANCE (A) GENERAL CONSIDERATIONS This document presents the minimum insurance requirements as set forth by the United States Trustee Program (USTP). A standing trustee must purchase property insurance
Zurich Security And Privacy Protection Policy Application
Zurich Security And Privacy Protection Policy Application COVERAGE A. AND COVERAGE F. OF THE POLICY FOR WHICH YOU ARE APPLYING IS WRITTEN ON A CLAIMS FIRST MADE AND REPORTED BASIS. ONLY CLAIMS FIRST MADE
Specialty Risk Protector
Specialty Professional Liability and Data and Network Security Insurance is a single policy that makes it easy for companies to secure the multi-faceted E&O protection our networked world requires. A simplified,
Data Privacy & Security: Essential Questions Every Business Must Ask
Data Privacy & Security: Essential Questions Every Business Must Ask Presented by: Riddell Williams P.S. Riddell Williams P.S. May 6, 2015 #4841-4703-9779 Innocent? 2 Overview 3 basic questions every business
cyber invasions cyber risk insurance AFP Exchange
Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance
Cybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.
Cybersecurity: Minimizing Risk & Responding to Breaches March 5, 2015 Andy Chambers Michael Kelly Jimmie Pursell Scope of Problem Data Breaches A Daily Phenomenon Anthem JP Morgan / Chase Sony Home Depot
