National Corporate Practice. Cyber risks explained what they are, what they could cost and how to protect against them
|
|
|
- Jade Brooks
- 10 years ago
- Views:
Transcription
1 National Corporate Practice Cyber risks explained what they are, what they could cost and how to protect against them
2 what this briefing covers ff Introduction ff Section 1: What are the risks and the impacts? Cyber crime and cyber terrorism Accidental loss of your own or someone else s data Liability for your online activities or comments made in s Physical loss of systems ff Section 2: What can be done to mitigate the risks? Where to start Risk control mechanisms ff Section 3: What is the insurance position? Gaps in traditional insurance policies Specialist insurance options ff Our offices across UK and Ireland 2 Cyber risk
3 introduction In the modern business environment, use of and interaction with electronic data and the internet is a normal - even critical - business activity. It can bring significant business efficiencies and growth opportunities, but also a range of particular risks that need to be understood and mitigated. For the purposes of this guide we are defining these as cyber risks, i.e. the specific risks that relate to the use of computers, information technology and virtual reality. The costs and impacts can be considerable. For example: The government has recently published figures highlighting that the cost of cyber crime in the UK is 27 billion a year, of which 21 billion is cost to businesses. Nearly half of this relates to theft of intellectual property a critical asset for many firms. The recently published National Security Strategy places cyber attack (including by other states, by organised crime and by terrorists) as one of the four highest priority risks for the UK currently and over the next five years. Help is at hand As with any risk, there is much that can be done to mitigate your position and protect yourself against costs, litigation and damage to reputation. As the world s leading risk and insurance services firm, Marsh has a 140 year history of helping organisations respond to new and emerging risks. This document explains the risks, the risk management actions that can be taken and the insurance options available. For further information and assistance, please contact your usual Marsh representative or e mail [email protected] Cyber risk 3
4 section 1: what are the risks and the impacts? The cyber risks to the business can be split into the following broad areas: losses due to cyber crime and cyber terrorism accidental loss of your own or someone else s data physical loss of systems liability for your online activities or comments made in s. We explore each of the areas in the following paragraphs. 1.3bn per annum from direct online theft (e.g. fraudulently obtaining access and looting company accounts and monetary reserves). 1bn per annum from the theft of sensitive customer data from cyber attacks. Source: The cost of cyber crime: A Detica report in partnership with the Office of Cyber Security and Information Assurance in the Cabinet Office. February cost-of-cyber-crime Cyber crime and cyber terrorism A lot of financially motivated crime has now gone digital. Criminals are increasingly seeking to exploit vulnerabilities in the internet and electronic systems for financial gain. And the bad news is, it is businesses that are suffering the most. A recent study estimates the economic cost of cyber crime to UK businesses is 21bn per annum. This estimate includes: 9.2bn per annum from theft of intellectual property (copyright, ideas, designs, methodologies and trade secrets). 7.6bn per annum from industrial espionage (stealing of competition sensitive information which could impact a company s chances of winning open tenders and the loss of information which could enable cyber criminals to gain advantage from share price movements). 2.2bn per annum from extortion (cyber criminals hold a company to ransom, e.g. through the deliberate crashing or hacking of systems, or by manipulating company website links, which can lead to extensive brand damage). 4 Cyber risk
5 section 1: what are the risks and the impacts? The results of this study suggest that businesses need to look again at their defences to determine whether their information is indeed well protected. Encouraging companies in all sectors to make investments in improved cyber security, based on improved risk assessments, is likely to considerably reduce the economic impact of cyber crime on the UK. Quote from The cost of cyber crime report The government s recently published National Security Strategy puts cyber attack in the four highest priority risks for the UK currently and over the next five years. You can find out more at consum_dg/groups/dg_digitalassets/@dg/@en/ documents/digitalasset/dg_ pdf The report includes consideration of cyber terrorism that is, acts directed towards the overthrowing or influencing of the government. Cyber terrorism could be a concern to businesses operating in sectors linked to the government or infrastructure, for example transport, communications, health; as they may form part of the target for a cyber terrorism attack. Cyber risk 5
6 section 1: what are the risks and the impacts? Accidental loss of your own or someone else s data Crime is not the only way that data can be lost or compromised. Regular press articles about lost laptops, memory sticks and CDs are a reminder of the vulnerability of data held electronically. Other causes of data loss include viruses, natural disasters, fires, accidental or deliberate deletion, system crashes, corruption and hardware failure. Business impacts of data loss include claims from customers and suppliers for breach of confidentiality, breach of contract and negligence, direct revenue loss, interruption to business and damage to reputation. There can also be additional work and expense in crisis containment and managing adverse publicity. Research by the Ponemon Institute found that, in 2009, the average cost to a UK organisation of a data breach was 1.68 million. Much of the costs related to lost business or measures to prevent a loss of customer trust. (Source: Annual study: cost of a data breach, Ponomon Institute January 2010). Data losses resulting from outsourcing data to third parties were found to be common, as were breaches resulting from lost laptops and other mobile devices. There is also the regulatory position to consider. The Information Commissioner has a range of sanctions available, including the ability to levy a fine of up to 500,000 for loss of sensitive personal data. See Physical loss of systems Cyber activity often requires a physical information technology system. Therefore it is important to consider the risk of loss or damage to physical equipment. It can be damaged by anything from a fire to a temperature change in a server room, from a flood to an electrical surge. Liability for your online activities or comments made in s Electronic communication can be of great benefit to businesses. However, it can also produce threats. An incorrect, misleading, libellous or even illegal statement on a website, or in an , can lead to compensation claims and damage to reputation. Social networking by employees can result in liabilities for employers and is more difficult to control than official business . For businesses engaged in online trading (selling goods and services via a website) there are additional risks. For example, failure to keep customer login or payment card data secure can lead to a large volume of compensation claims. Incorrect pricing of a product can lead to financial shortfalls. Marketing communications on websites are now covered by the The UK Code of Non-broadcast Advertising, Sales Promotion and Direct Marketing (CAP code). This includes rules relating to misleading advertising, social responsibility and the protection of children. 6 Cyber risk
7 section 2: what can be done to mitigate the risks? Where to start The starting point is to identify and assess the specific risks and impacts to your business. Create an inventory of the critical business data and information you hold in electronic format (customer and supplier data, employee records, financial information, designs, product specifications, plans, etc.) Then ask yourself what the impact would be if you lost any of it. What controls do you have in place? Could they be improved? A similar process can be followed in respect of your online content. Create an inventory of your websites, intranets, any mobile sites and applications. What is the process for adding, removing or changing content on them and how is it controlled? What is your dependency on third parties? (For example, in respect of data outsourcing, website management, equipment and networks.) How much do you know about them and their competencies? What legal and contractual controls do you have in place? What business critical information and data technology systems do you have and how is the equipment that runs them protected? What plans do you have in place for manual workarounds for critical functions such as payroll, finance, manufacturing, etc. if you lost your IT systems? Find out how much you and your employees are engaged with social networking sites and how much they are identified with you, their employer. Do you have a policy regarding use of social networking, and has this been communicated effectively to employees? Cyber risk 7
8 section 2: what can be done to mitigate the risks? Risk control mechanisms Once you understand the extent of the risks, you can consider control mechanisms, which should then be recognised in the organisation s formal cyber risk policy and procedures. While the specific controls will be unique to each business, we have shared some examples below, split into six broad areas: Security: We recommend you look at: Physical security at operating locations (intruder detection, access restrictions, locks, etc). IT system security (segregated networks, with isolation of business critical information and data, system intruder detection, identity and access management, anti malware tools, etc). Data security, e.g. encryption especially of mobile equipment, anti spyware, etc. IT security management should be centralised, so it can be uniformly enforced across the entire IT network in the business. Legal controls: Work with your legal advisers to ensure you have robust legal protections in place where possible. These include: Patents Copyrights Secrecy and confidentiality clauses in contracts, including employment contracts. Whilst these will not protect against criminal acts, they could at least give you a level of protection against an accidental breach and may serve to focus the minds of contractors and outsourcing parties as to their own responsibilities and the controls that they should maintain. Contractor and partner vetting: When a procurement exercise is undertaken, an assessment of the candidates risk management controls should be an important part of the selection criteria. If they are interacting with your information technology systems or data, you should ask to see their cyber risk management policy and procedures. Make sure you are comfortable with their proposed physical and management controls. Do you consider their employee training and communication around data protection to be adequate? Obtain details of any previous incidents and losses and any remedial action taken. Do they have employee vetting and monitoring processes in place (especially if they are to handle sensitive data)? Do they have any insurance in place which could provide some protection? 8 Cyber risk
9 section 2: what can be done to mitigate the risks? Employee training, communication and vetting: Dealing with electronic data and messaging is now such a routine part of daily working and personal life that employees may not be alert to the risks stemming from inadvertent or malicious actions. Therefore we recommend the following: Develop a robust policy and procedures, backed up with the potential for disciplinary action if a breach occurs. Develop and deliver a training course to communicate the issues and procedures to employees, followed up with regular reminders about data security and messaging policies. For those staff handling sensitive data, more detailed and specific training should also take place. You should consider background screening and vetting to employees handling sensitive, confidential information. How Marsh can help you Marsh can facilitate an IT and data security workshop to help you identify and assess the specific risks to your business. We can then work with you to develop a costed and timed action plan to enhance controls. Insurance: This is an important part of a cyber risk management strategy. It is a complex subject and in the next section we explain what cover is typically available under standard insurance policies and go on to profile the protection provided by specialist cyber risk insurance policies. Post event plans: In addition to the preventative measures profiled earlier, we recommend you consider how you would react if an incident did occur. This involves formulating plans to deal with the crisis and recovery of the business/business systems. Media and public relations strategies to manage crisis communications need to be part of the plan, as some incidents could become high profile and public. So too do communications to individuals and/or organisations whose data has been lost or compromised. Cyber risk 9
10 section 3: what is the insurance position? Gaps in traditional insurance policies Property and business interruption policies: these typically limit cover to loss or damage to tangible physical property, and resulting loss of revenue, resulting from an insured physical peril (fire, flood, etc.) Computers and the data contained on them are susceptible to some specialist causes of damage, which will not be covered if you are insured on this basis. For example, damage resulting from a change in temperature in your server room, loss of power supply, software corruption or breakdown, are not covered by a standard property or business interruption policy. Neither is accidental loss or theft of data and the resulting financial impact. Theft insurance policies: These often limit cover to theft of tangible assets following forcible or violent entry to/exit from the premises. They would therefore not pick up theft of data, which is an intangible asset and one which is often stolen remotely. Even if full theft cover is in force, i.e. without the need for forcible or violent entry to/exit from the premises, arguments regarding cover for data, as an intangible asset, remain. Terrorism insurance policies: These work on the basis of physical damage, so a cyber attack designed to compromise the information technology infrastructure - but usually without physical damage - would not be covered. Fidelity guarantee/crime policies: These generally limit cover to direct loss resulting from theft by employees of money, securities or other tangible property. Even broadened coverage under a computer crime extension limits cover to the cost of recollecting or restoring the damaged or corrupted data. These policies will often specifically exclude cover for the actual theft of data or information. General liability and errors and omissions policies: These usually only respond where there has been negligence on the part of the insured. They usually exclude cover for criminal or deliberate acts of the insured or its employees, and expenses associated with a privacy breach (such as notification costs and regulatory defence). Some policies also specifically exclude any liability for electronic data. 10 Cyber risk
11 section 3: what is the insurance position? Specialist insurance options Marsh s specialist computer insurance facility: This widens cover for information technology risks to include: Damage or business interruption due to hacking, virus or misuse of data. Publicity costs directly relating to the protection of brand image (i.e. to counter the impact of negative press coverage flowing from damage and/or loss of information). Full theft cover on computer equipment and data, without security requirements. Cover whilst in transit or located outside the UK. Loss of information (loss, distortion, corruption or erasure of programmes and data). Breakdown cover (without the need for a maintenance agreement), in respect of desktop PCs and portable computer equipment. Residual breakdown cover on all other computer equipment. Additional expenditure incurred following unexpected failure or impairment of external IT or power supply. Cost of replacement licence agreements. Specialist cyber insurance (available through Marsh with a range of insurers): This can provide even wider protection including: Legal liability to others for computer security breaches. Legal liability to others for privacy breaches (including breaches by the insured s third party contractors). Legal liability for online media content. Costs associated with regulatory actions and scrutiny. Loss or damage to data/information. Loss of revenue due to a computer attack. Extra expense to recover/respond to a computer attack. Loss or damage to reputation. Privacy notification costs. Identity theft. Cyber extortion (e.g. ransom costs or investigative expenses). Cyber terrorism. Note: the descriptions of insurance covers contained in this section are outlines only. Terms, conditions and limits apply. Full details are available on request. Damage to computer equipment following a change in temperature, including resultant reinstatement of data and/or additional expenditure. How Marsh can help you Marsh can carry out an insurance gap analysis to establish the extent and limitations of your existing insurance protection for cyber risks. Then we can obtain quotations for specialist computer, or wider cyber risk, insurance cover, tailored to the profile and requirements of your business. Cyber risk 11
12 our offices across the uk and ireland For details of the nearest and most appropriate Marsh claims expertise that is available to you, please contact your Marsh Client Executive. Aberdeen +44 (0) Belfast +44 (0) Birmingham +44 (0) Bristol +44 (0) CardIFF +44 (0) Carlisle +44 (0) Cork +353 (0) Derry +44 (0) Dublin +353 (0) EdinbURGH +44 (0) Galway +353 (0) GLASGOW +44 (0) Haywards Heath +44 (0) Isle of MAN +44 (0) Leeds +44 (0) Leicester +44 (0) Limerick +353 (0) London +44 (0) Miadstone +44 (0) manchester +44 (0) Milton Keynes +44 (0) Newcastle +44 (0) Reading +44 (0) Southampton +44 (0) Cyber risk
13 For further information, please contact your local Marsh office or visit our web site at: marsh.com The information contained herein is based on sources we believe reliable and should be understood to be general risk management and insurance information only. The information is not intended to be taken as advice with respect to any individual situation and cannot be relied upon as such. In the United Kingdom, Marsh Ltd is authorised and regulated by the Financial Services Authority for insurance mediation activities only. Marsh Ltd, trading as Marsh Ireland is authorised by the Financial Services Authority in the UK and is regulated by the Central Bank of Ireland for conduct of business rules only. Registered number: Registered office: 1 Tower Place West, Tower Place, London, EC3R 5BU Copyright 2011 Marsh Ltd All rights reserved Ref: F_Exp Apr 2013
How To Cover A Data Breach In The European Market
SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to
Cyber and Data Security. Proposal form
Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which
Managing Cyber Risk through Insurance
Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes
CYBER RISK SECURITY, NETWORK & PRIVACY
CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
Cyber Insurance Presentation
Cyber Insurance Presentation Presentation Outline Introduction General overview of Insurance About us Cyber loss statistics Cyber Insurance product coverage Loss examples Q & A About Us A- Rated reinsurance
Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC
Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you
Nine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
Cyber and data Policy wording
Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and
Airmic Review of Recent Developments in the Cyber Insurance Market. & commentary on the increased availability of cyber insurance products GUIDE
Airmic Review of Recent Developments in the Cyber Insurance Market & commentary on the increased availability of cyber insurance products GUIDE 1. Executive summary Airmic members have become increasingly
Cyber/ Network Security. FINEX Global
Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over
Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd
Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures
Cutting through the insurance jargon!
Cutting through the insurance jargon! Babbar Abbas October 2015 Who I am Babbar Abbas Worked in insurance for 7 years worked at Aon for 5 years Worked with numerous non-profit organisations varying in
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
Guidance on data security breach management
Guidance on data security breach management Organisations which process personal data must take appropriate measures against unauthorised or unlawful processing and against accidental loss, destruction
CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:
Company or Trading Name: Address: Post Code: Telephone: E-mail: Website: Date Business Established Number of Employees Do you have a Chief Privacy Officer (or Chief Information Officer) who is assigned
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Cyber Liability Insurance Data Security, Privacy and Multimedia Protection
Page 1 of 5 Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such an alarming rate and business is more and more reliant on IT
Cyber Threats: Exposures and Breach Costs
Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning
Guidance on data security breach management
ICO lo Guidance on data security breach management Data Protection Act Contents... 1 Data Protection Act... 1 Overview... 1 Containment and recovery... 2 Assessing the risks... 3 Notification of breaches...
Cyber Liability Insurance Data Security, Privacy and Multimedia Protection
Page 1 of 5 Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such an alarming rate and business is more and more reliant on IT
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
ISO? ISO? ISO? LTD ISO?
Property NetProtect 360 SM and NetProtect Essential SM Which one is right for your client? Do your clients Use e-mail? Rely on networks, computers and electronic data to conduct business? Browse the Internet
Rogers Insurance Client Presentation
Rogers Insurance Client Presentation Network Security and Privacy Breach Insurance Presented by Matthew Davies Director Professional, Media & Cyber Liability Chubb Insurance Company of Canada [email protected]
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
Data Protection Breach Management Policy
Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/
GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Cybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
APIP - Cyber Liability Insurance Coverages, Limits, and FAQ
APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
OCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT ORGANISATIONAL SYSTEMS SECURITY T/601/7312 LEVEL 3 UNIT 5 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 ORGANISATIONAL SYSTEMS
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Our specialist insurance services for Professionals risks
Our specialist insurance services for Professionals risks Price Forbes & Partners is an independent Lloyd s broker based in the heart of London s insurance sector. We trade with all of the major international
DATA BREACH COVERAGE
THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000
DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE
DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
Understanding the Business Risk
AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 [email protected] Disclaimer The views expressed
Navigating Cyber Risk Exposure and Insurance. Stephen Wares EMEA Cyber Risk Practice Leader Marsh
Navigating Cyber Risk Exposure and Insurance Stephen Wares EMEA Cyber Risk Practice Leader Marsh Presentation Format Four Key Questions How important is cyber risk and how should we view the cyber threat?
IT OUTSOURCING SECURITY
IT OUTSOURCING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business.
FSA factsheet for All firms This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business. It explains: What you should
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
THE MORAY COUNCIL. Guidance on data security breach management DRAFT. Information Assurance Group. Evidence Element 9 appendix 31
THE MORAY COUNCIL Guidance on data security breach management Information Assurance Group DRAFT Based on the ICO Guidance on data security breach management under the Data Protection Act 1 Document Control
Cyber Risks and Insurance Solutions Malaysia, November 2013
Cyber Risks and Insurance Solutions Malaysia, November 2013 Dynamic but vulnerable IT environment 2 Cyber risks are many and varied Malicious attacks Cyber theft/cyber fraud Cyber terrorism Cyber warfare
Security Incident Management Policy
Security Incident Management Policy January 2015 Document Version 2.4 Document Status Owner Name Owner Job Title Published Martyn Ward Head of ICT Business Delivery Document ref. Approval Date 27/01/2015
Insurance implications for Cyber Threats
Lillehammer Energy Claims Conference Lillehammer March 7, 2014 Insurance implications for Cyber Threats How enterprises need to prepare for the inevitable JLT is one of the world s largest providers of
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
The Growing Problem of Data Breaches in America
Continuity Insights The Growing Problem of Data Breaches in America Today s Questions to Cover 1. What is a Data Breach? 2. How Significant is the Problem? 3. How Do Thieves Steal the Data? 4. How Does
THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill
THE ANATOMY OF A CYBER POLICY Jamie Monck-Mason & Andrew Hill What s in a name? Lack of uniformity in policies: Cyber Cyber liability Data protection Tech PI The scope of cyber insurance First party coverage
Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler
Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President [email protected] 2 What s at Risk? $300 billion in
Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014
Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014
Protection of Computer Data and Software
April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal
Data Security Breach Incident Management Policy
Data Security Breach Incident Management Policy Contents 1. Background... 1 2. Aim... 1 3. Definition... 2 4. Scope... 2 5. Responsibilities... 2 6. Data Classification... 2 7. Data Security Breach Reporting...
Information Security Incident Management Policy and Procedure. CONTROL SHEET FOR Information Security Incident Management Policy
Bolsover District Council North East Derbyshire District Council & Rykneld Homes Ltd Information Security Incident Management Policy September 2013 Version 1.0 Page 1 of 13 CONTROL SHEET FOR Information
Cyber Insurance as one element of the Cyber risk management strategy
Cyber Insurance as one element of the Cyber risk management strategy Stéphane Hurtaud Partner Governance, Risk & Compliance Thierry Flamand Partner Insurance Leader Laurent de la Vaissière Director Governance,
Care Providers Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management
Care Providers Protecting your organisation, supporting its success Risk Management Insurance Employee Benefits Investment Management Care providers are there to help those in need. But who helps the care
ACE European Risk Briefing 2012
#5 ACE European Risk Briefing 2012 IT and cyber risk respondent profiles The research was carried out between 13 April and 3 May 2012. The sample comprised 606 European risk managers, CROs, CFOs, COOs
An Introduction to Cyber Liability Insurance. Catherine Berry Senior Underwriter
An Introduction to Cyber Liability Insurance Catherine Berry Senior Underwriter What is cyber risk? Exposures emanating from computer networks and the internet The Cyber Risk Phenomenon The incredible
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
NZI LIABILITY CYBER. Are you protected?
NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is
Cyber Risks in Italian market
Cyber Risks in Italian market Milano, 01.10.2014 Forum Ri&Assicurativo Gianmarco Capannini Agenda 1 Cyber Risk - USA 2 Cyber Risk Europe experience trends Market size and trends Market size and trends
developing your potential Cyber Security Training
developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
WEBSITE TERMS OF USE
WEBSITE TERMS OF USE 1. GENERAL 1.1 The Site is operated by Locomote Technologies Trading Pty Ltd (we). We are registered in Australia under company number 160 815 430. For the purposes of these Website
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
Information and Communication Technology, Cyber and Data Security
Information and Communication Technology, Cyber and Data Security Contents Information and Communication Technology 1 ICT Professional Indemnity 2 Claims scenarios 4 Cyber and Data Security 5-7 Claims
Cyber-Crime Protection
Cyber-Crime Protection A program of cyber-crime prevention, data breach remedies and data risk liability insurance for houses of worship, camps, schools, denominational/association offices and senior living
