STATE of the market ON CYBER RISK

Size: px
Start display at page:

Download "STATE of the market ON CYBER RISK"

Transcription

1 STATE of the market ON CYBER RISK

2 TABLE OF CONTENTS The Takeaway 1 The Overview 2 Review & Outlook 5 Placements & Considerations 7 Summary 9 Notes 10

3 THE TAKEAWAY Year-over-year increases in the frequency and cost of cyber incidents nearly doubling since coupled with heightened regulatory scrutiny and growing litigation, are causing a surge in demand for cyber liability insurance. As small and midsize businesses begin to recognize their exposure to cyber liability, more insurance markets are committing capacity to serve those needs. Cyber insurance products are complex, and they vary widely from insurer to insurer. Unlike mature lines of business such as property insurance, the marketplace does not yet have a consistent set of policy terms or definitions for cyber risks. Moreover, cyber policies also vary in their application of sublimits and service offerings to respond to data breaches, such as forensic investigations, legal services and credit monitoring. As a result, comparing cyber liability policies is difficult without extensive knowledge of the products and the marketplace. Retail insurance agents and brokers have nearly equal measures of opportunity and challenge when it comes to selling cyber insurance. Businesses of all sizes are realizing that cyber coverage is becoming a necessity. The question many businesses are asking is no longer, Do we need cyber insurance? but How much coverage should we buy? The downside is that the fluidity of the market and the many nuances in product offerings can make finding appropriate coverage for customers a tall order. To obtain the best coverage options and meet clients service expectations, agents and brokers should turn to partners with proven expertise in cyber coverage and a record of success in procuring it. 1

4 THE OVERVIEW Massive data breaches in the last few years, such as those at Target Corp., ebay, The Home Depot and Anthem Inc., which resulted in the exposure of hundreds of millions of records, have broadened awareness of cyber risk. Media attention to these incidents, however, tends to obscure the fact that breaches are occurring across virtually all industries, and are particularly common among small and midsize organizations. A growing trend in connectivity, known as the Internet of Things, may become a significant factor in future cybersecurity exposure. The Internet of Things is a collection of devices embedded with sensors capable of exchanging information. Cisco Systems Inc. estimates that by 2020 the Internet of Things will comprise 50 billion networked devices. According to the Identity Theft Resource Center (ITRC), nearly 800 data breaches were publicly reported in 2015, in the press or by government sources, representing more than 169 million total exposed records. ITRC defines a breach as an event in which an individual s Social Security number, driver s license number, medical record, or a financial record/credit/debit card is potentially put at risk either in electronic or paper format. While some of the breaches involved very large organizations and millions of records exposed, many of the entities on ITRC s breach list were small or midsize.i Among those experiencing breaches in 2015 were: Sole-proprietor Certified Public Accountants Law firms Drycleaning companies Car wash businesses Sporting and recreational goods manufacturers High schools Food courts Gift shops Insurance agencies and brokerages Third-party claim administrators The ITRC list shows that businesses in many industries, including agents and brokers themselves, are exposed to cyber incidents. 2

5 Healthcare organizations are especially vulnerable to data breaches. While much attention focused on Anthem Inc. s announcement in February 2015 that it had a breach exposing nearly 80 million records, one of the largestever data incidents, often overlooked are the many solo practitioner medical and dental offices and outpatient healthcare facilities that also suffer data breaches. The situation is similar among retail merchants. Target s 2013 breach involving more than 110 million records was an eye-opener, not just in the size of the incident, but in the method hackers used. The retail company s network was penetrated by hackers through a heating, ventilation and air-conditioning vendor. If a company with Target s resources was vulnerable, then virtually any merchant holding customer records or employee records could be at risk of cyber attack. Smaller businesses vulnerability to cyber incidents is great, according to research by the National Small Business Association. II In its 2013 Technology Survey, NSBA found that 44% of small businesses those with $150 million or less in revenue and fewer than 500 full-time employees have already experienced a cyber attack. Moreover, 79% said they do not understand or have little to moderate understanding of cybersecurity issues and how to handle the online security of their businesses. In effect, smaller businesses fall into two camps: those that have already had a breach and those that will eventually. Into the Breach Reported Incidents Rise Dramatically Sources: Identity Theft Resource Center, Statista 3

6 Most Cyber Incidents Hit Smaller Firms 71% THE PERCENTAGE OF ORGANIZATIONS EXPERIENCING CYBER ATTACKS WITH TWO BILLION DOLLARS OR LESS IN REVENUE Source: NetDiligence 2015 Cyber Claims Study The cost of cyber incidents has continued to rise and remains disproportionately high for smaller organizations, according to various sources. The total cost does vary but generally increases with the number of records exposed. Therefore, a data breach affecting millions of records is likely to cost more than one involving hundreds or thousands of records. Cyber risk assessment firm NetDiligence, in its 2015 Cyber Claims Study, examined 160 incidents involving businesses ranging from less than $50 million in revenue to more than $100 billion. NetDiligence found that smaller businesses generated some of the largest claims. III Critical drivers of these claim costs are: forensics, legal and regulatory costs. Cyber Claim Costs High Among Smaller Firms Total Cost of Claims From Data Breaches, Including Self-Insured Retentions Revenue Size Average Cost Maximum Less Than $50M $65,096 $809,788 $50-$300M $150,018 $764,225 $300M-$2B $578,233 $4.9M $2B-$10B $910,801 $6.7M $10B-$100B $4,800,000 $15M The Ponemon Institute, in its 2015 Cost of Cyber Crime Study, found that smaller organizations in the United States have a significantly higher annual cost per capita from cyber crime than larger organizations, averaging $1,571 vs. $667. IV Ponemon also found that the type of attacks that account for the largest costs among smaller organizations were: Malicious code, representing 27% of attacks Denial of services, 21% Phishing/social engineering, 12% Malicious insiders, 11% The institute s study examined organizations with a minimum of 1,000 individual connections to the Internet, or enterprise seats. Smaller organizations were defined as those below the median number of seats, while larger organizations were those above the median. According to Ponemon s research, the cost of cyber crime in the United States since 2010 has increased 82%, to an average of $15.4 million per company for

7 REVIEW & OUTLOOK The marketplace is observing businesses interest in cyber coverage and many insurance companies are positioning themselves to gain market share. With the exception of a few classes of business where the perceived risk is high, e.g. healthcare, large retail operations and payment processors, capacity for cyber risk is plentiful. A manufacturing client that doesn t hold a lot of records, for example, might find insurers willing to issue larger limits. After the Target data breach in 2013, there was a brief hard market for retail accounts, but conditions have eased somewhat. Insurers remain cautious about writing risks where a business holds a large amount of credit card data. Cyber liability insurers in general are controlling risks in their books through sublimits and deductibles. Capacity for cyber risks appears to be increasing as insurers see a big opportunity to grow their market share. Despite the sharply higher interest in cyber insurance, relatively few businesses have purchased the coverage up to now a situation that is certain to change as trends continue. One way to view the opportunity for growth in cyber insurance is that if only 10% of U.S. businesses are buying cyber coverage, then 90% aren t. There are literally billions of dollars in potential premiums that haven t yet been written. Pricing becoming favorable For small businesses, the price of cyber coverage for many classes seems to be going down, while coverage is increasing. For organizations with fewer than 100 employees, prices are coming down, deductibles are decreasing and coverage limits are going up. Coverage can still get pricey for medium to large businesses and certain higher-hazard classes, however. For medium size businesses, insurance is not as expensive as many business owners might expect. A lot of businesses can buy cyber coverage for $2,000 to $10,000 in premium. But it depends on the exposure, which can vary even among companies with the same amount of revenue. A manufacturer, for example, might hold 5,000 records, while a restaurant producing the same level of revenue might hold half a million credit card records. Their risk profiles are clearly different, and so will be the premiums on their coverage. Overall, prices for cyber coverage at renewal aren t dropping across the board, but sublimits are starting to go away and capacity is available. For example, exclusive facilities at CRC Insurance Services can provide up to $60 million in combined limits, along with breach response services. Services are critical to policy value Businesses that purchase a cyber policy essentially are buying two things: Insurance. The exchange of premiums for cyber risk gives policyholders monetary assets to cover the financial elements of an incident. Expert services. In addition to the underwriting and claims expertise of the insurance company, many but not all -- cyber policies include access to legal, forensic and other services to respond to a cyber incident. 5

8 Those services greatly increase the value of a cyber insurance policy because breach response services are expensive to obtain separately. Legal fees alone could exceed the cost of the coverage. Insurance companies have spent hundreds of hours vetting and negotiating costs with the best cyber lawyers and forensic companies, providing them to policyholders at below-market rates. When a policyholder experiences a cyber incident, once the claim is reported the insurance company and its experts step in and take on the work to help the policyholder recover. Knowing what services are available as part of the policy, and which ones would be most beneficial to a given client s situation, is a competitive advantage for retail agents and brokers. Cyber market evolution Cyber insurance is still evolving, but it is following a development path that has been seen before. The current phase cyber insurance products resembles that of employment practices liability policies more than 20 years ago. In the early 1990s, EPLI was a new product that attracted a lot of interest. Many employers considered it, just as companies are doing now with cyber, trying to assess how much of the specialized coverage they should buy. Similarly, it took underwriters time to develop consistent terms and pricing to refine the product, but that happened after a few years. Subsequent changes in the regulatory environment made EPLI even more attractive. Today, EPLI is purchased by a majority of businesses. The first cyber insurance solutions appeared in the late 1990s. The earliest forms of coverage were for technology errors and omissions liability, then products evolved to cover network security. Now, the cyber insurance marketplace is providing extensive coverage for data breaches. As businesses exposures to technology risks have evolved, so too have the products designed to protect them. 6

9 PLACEMENT CONSIDERATIONS Even though insurers appetite for cyber risk is generally high and capacity is available, differences in policies and restrictions on certain classes of business require careful consideration to obtain the best placements. There are perhaps 50 or so markets currently offering cyber insurance. For higher-hazard classes, such as large retail merchants or healthcare entities, the number of markets willing to quote is much smaller. Product offerings continue to evolve and the market overall is fluid. Some markets offer coverage for first-party losses, such as the cost to conduct a forensic investigation, public relations, credit monitoring and notification. Others provide coverage for third-party liability and some markets don t; still others have sublimits on third-party losses. Up-to-date knowledge of the marketplace is critical to successfully placing the best coverage for a client. Retail agents and brokers need to be familiar with the options before talking with their customers. Understanding the nuances in cyber insurance products is challenging, however, because policy forms are different from insurer to insurer. A cyber policy can be 20 to 40 pages long, and terms are not consistent across policies. For example, what one underwriter calls e-threat, another might call cyber extortion. Privacy protection and breach cost coverage can be defined differently, depending on who is underwriting it. A property policy, in contrast, is straightforward and easy to understand because the vast majority of definitions are uniform. In cyber, however, quotes may look the same but coverage levels may be vastly different. Mapping the differences in cyber insurance is not a simple process, but relying on an expert partner that understands many different coverage forms, as well as the intent of the underwriters, is a smart move. For example, many agents and insureds assume that circumstances of social engineering involving voluntary transfers of funds is covered by their crime policies under computer fraud, but it s not. To ensure coverage, it typically needs to be endorsed on either the crime or the cyber policy. Cyber-attacks don t occur during regular business hours. Cyber extortion coverage is critical to respond to ransomware demands that can paralyze operations. Brokers need to ask customers if they are prepared to respond to these demands and partner with carriers with proven track records that can respond immediately to cyber extortion demands. 7

10 Large, publicly traded companies tend to be very attuned to cyber exposures because they are in the headlines. Their boards may have a number in mind as to how much in coverage limits they want and it becomes an exercise in how much do they want to pay to have $10 million, $20 million or $50 million in coverage. For smaller and midsize clients, cyber risk is on their radar but these buyers often seek only $1 million, $3 million or $5 million in limits. Businesses needing a ready source of broad cyber liability coverage can access up to $10 million in limits through CRC s exclusive Corona facility. This facility provides cyber liability and technology E&O liability coverage for U.S. businesses with up to $200 million in revenue. Midsize and large businesses can obtain up to $50 million in limits for cyber liability from a new, exclusive CRC facility under-written in London. The facility is open to most classes of business. Pricing, sublimits vary The marketplace remains unaligned on pricing, retentions and sublimits, as insurers continue to evaluate them. For example, a policy with a $1 million limit may have a $250,000 sublimit on notification and cost $4,000; another insurer may charge $7,000 for a policy with a $1 million limit; and depending on class of business, that same level of coverage from a different insurer might cost $12,000. Sublimits indicate where insurance carriers are concerned about loss. Large, global insurers tend to sublimit their cyber policies, while the London market s approach is generally to offer full limits. For that reason, placing a tower of cyber coverage or seeking excess coverage typically is easier to do in London. Some package policies include cyber coverage, but they usually contain a small sublimit, such as $25,000. That amount could easily be consumed by the forensic costs involved in a breach of as little as 100 records. Understanding the client s exposure and resources in a breach incident is critical to obtaining adequate coverage. Exclusions need to be parsed out in the different policies available to small and midsize businesses. For example, some insurers exclude coverage for unencrypted mobile devices, and others exclude coverage for failure to maintain information technology systems. There is a heavy burden on business owners to be consistent. 8

11 SUMMARY Cyber insurance products are complex, and there is no one-size-fits-all solution for cyber risk. Even though the marketplace is generally eager to write cyber coverage, product offerings vary widely, and there is no uniform set of terms or definitions. Partnering with a wholesaler that has relationships with multiple markets, knows the specific appetites of those markets and understands the differences in policy forms saves both time and money in obtaining the best coverage solutions for the policyholder. There are few insurance product lines where a mistake by the retail agent or broker can result in the loss of the entire account. Cyber liability is becoming one of those; the stakes are higher. It s easier to make an error in cyber because every policy is different. One quote might look great, but another company might offer a lot of services for free. Regardless of size, the client needs help with cyber coverage. An agent or broker can t provide a lesser product or less service when it comes to protecting a client against cyber risk. 9

12 NOTES i Identity Theft Resource Center, 2015 Data Breach Reports, ii National Small Business Association 2013 Technology Survey, pdf iii NetDiligence 2015 Cyber Claims Study, iv Ponemon Institute LLC, 2015 Cost of Cyber Crime Study, v Payment Card Industry Security Standards Council, PCI DSS Quick Reference Guide, PCIDSS_QRGv3_1.pdf vi National Conference of State Legislatures, Security Breach Notification Laws, CRC Insurance Services, Inc. CA Lic No No claim to any government works or material copyrighted by third parties. Nothing in this communication constitutes an offer, inducement, or contract of insurance. Financial strength and size ratings can change and should be reevaluated before coverage is bound. This material is intended for licensed insurance agency use only. This is not intended for business owner or insured use. If you are not a licensed agent please disregard this communication. Equal Opportunity Employer Minority/Female/Disabled/Veteran. 10

CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY. October 2014. Sponsored by:

CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY. October 2014. Sponsored by: CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY October 2014 CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY Global reinsurer PartnerRe collaborated with Advisen to conduct a comprehensive market survey

More information

CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY

CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY October 2015 CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY Global reinsurer PartnerRe has once again collaborated with Advisen to conduct a comprehensive

More information

WHITE PAPER BREACH, PRIVACY, AND CYBER COVERAGES: FACT AND FICTION CYBER COVERAGES

WHITE PAPER BREACH, PRIVACY, AND CYBER COVERAGES: FACT AND FICTION CYBER COVERAGES BREACH, PRIVACY, AND CYBER COVERAGES: FACT AND FICTION IDT911 1 DEFINITIONS 1. Cyber Programs - Focuses on services and systems related to technology and their use in business. Risks addressed include

More information

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former

More information

Cyber Insurance as one element of the Cyber risk management strategy

Cyber Insurance as one element of the Cyber risk management strategy Cyber Insurance as one element of the Cyber risk management strategy Stéphane Hurtaud Partner Governance, Risk & Compliance Thierry Flamand Partner Insurance Leader Laurent de la Vaissière Director Governance,

More information

Cyber-insurance: Understanding Your Risks

Cyber-insurance: Understanding Your Risks Cyber-insurance: Understanding Your Risks Cyber-insurance represents a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some

More information

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance Today s agenda Introductions Cyber exposure overview Cyber insurance market and coverages Captive cyber insurance

More information

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

CYBER & PRIVACY LIABILITY INSURANCE GUIDE CYBER & PRIVACY LIABILITY INSURANCE GUIDE 01110000 01110010 011010010111011001100001 01100 01110000 01110010 011010010111011001100001 0110 Author Gamelah Palagonia, Founder CIPM, CIPT, CIPP/US, CIPP/G,

More information

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President

More information

Updates within Network Security and Privacy Risk Management

Updates within Network Security and Privacy Risk Management Updates within Network Security and Privacy Risk Management RIMS Minneapolis Meeting Melissa Krasnow, Partner, Dorsey & Whitney LLP (Minneapolis, MN) Mario Paez, Midwest Practice Leader for Tech., Privacy,

More information

Understanding the Cyber Risk Insurance and Remediation Services Marketplace:

Understanding the Cyber Risk Insurance and Remediation Services Marketplace: Understanding the Cyber Risk Insurance and Remediation Services Marketplace: A Report on the Experiences and Opinions of Middle Market CFOs September 2010 Betterley Risk Research Insight for the Insurance

More information

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Cyber Insurance: How to Investigate the Right Coverage for Your Company 6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)

More information

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for? Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for? Authored by Neeraj Sahni and Tim Stapleton Neeraj Sahni is Director, Insurance Channel at Kroll Cyber Investigations

More information

Zurich specialty products errors and omissions (E&O) overview (growth target)

Zurich specialty products errors and omissions (E&O) overview (growth target) Management solutions Zurich specialty products errors and omissions (E&O) overview (growth target) Specialty E&O solutions provide our customers with the flexibility they are looking for when covering

More information

Discussion on Network Security & Privacy Liability Exposures and Insurance

Discussion on Network Security & Privacy Liability Exposures and Insurance Discussion on Network Security & Privacy Liability Exposures and Insurance Presented By: Kevin Violette Errors & Omissions Senior Broker, R.T. Specialty, LLC February, 25 2014 HFMA Washington-Alaska Chapter

More information

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures

More information

Examining the Evolving Cyber Insurance Marketplace

Examining the Evolving Cyber Insurance Marketplace Prepared Testimony and Statement for the Record of Ola Sage Founder and CEO e-management Hearing on Examining the Evolving Cyber Insurance Marketplace Before the Senate Committee on Commerce, Science,

More information

GALLAGHER CYBER LIABILITY PRACTICE. Cyber Risk Exposures and Solutions

GALLAGHER CYBER LIABILITY PRACTICE. Cyber Risk Exposures and Solutions GALLAGHER CYBER LIABILITY PRACTICE Cyber Risk Exposures and Solutions Cyber Risk Exposures and Solutions Arthur J. Gallagher & Co. s Cyber Liability Practice has the expertise and the desire to deliver

More information

Cyber Liability & Data Breach Insurance Claims

Cyber Liability & Data Breach Insurance Claims Cyber Liability & Data Breach Insurance Claims A Study of Actual Payouts for Covered Data Breaches Mark Greisiger President NetDiligence June 2011 Last year, privacy breaches ran about 1-2 per week. This

More information

CYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America

CYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America CYBER INSURANCE Cyber Insurance and Gaps in Traditional Insurance Cyber and E&O Team Willis FINEX North America Privacy & Network Security (Cyber) Insurance COVERAGE MODULES Privacy Expense Consumer Notification

More information

OECD PROJECT ON CYBER RISK INSURANCE

OECD PROJECT ON CYBER RISK INSURANCE OECD PROJECT ON CYBER RISK INSURANCE Introduction 1. Cyber risks pose a real threat to society and the economy, the recognition of which has been given increasingly wide media coverage in recent years.

More information

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you

More information

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in

More information

Understanding the Business Risk

Understanding the Business Risk AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 [email protected] Disclaimer The views expressed

More information

Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace

Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace Testimony of Ben Beeson Vice President, Cyber Security and Privacy Lockton

More information

Cyber-Insurance Metrics and Impact on Cyber-Security

Cyber-Insurance Metrics and Impact on Cyber-Security Cyber-Insurance Metrics and Impact on Cyber-Security Sometimes we can... be a little bit more vigorous in using market-based incentives, working with the insurance industry, for example... DHS Secretary

More information

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become

More information

Cyber Risk Management

Cyber Risk Management Cyber Risk Management A short guide to best practice Insight October 2014 So what exactly is 'cyber risk'? In essence, cyber risk means the risk connected to online activity and internet trading but also

More information

Cyber-Crime Protection

Cyber-Crime Protection Cyber-Crime Protection A program of cyber-crime prevention, data breach remedies and data risk liability insurance for houses of worship, camps, schools, denominational/association offices and senior living

More information

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.

More information

Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age

Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: August 2013

More information

EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND?

EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND? EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND? ABOUT JLT SPECIALTY JLT Specialty Insurance Services is the U.S. platform of JLT Group, the leading specialty business adivsory

More information

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor Cyber Risks Management Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor 1 Contents Corporate Assets Data Breach Costs Time from Earliest Evidence of Compromise to Discovery of Compromise The Data Protection

More information

What would you do if your agency had a data breach?

What would you do if your agency had a data breach? What would you do if your agency had a data breach? 80% of businesses fail to recover from a breach because they do not know this answer. Responding to a breach is a complicated process that requires the

More information

CYBER SECURITY SPECIALREPORT

CYBER SECURITY SPECIALREPORT CYBER SECURITY SPECIALREPORT 32 The RMA Journal February 2015 Copyright 2015 by RMA INSURANCE IS AN IMPORTANT TOOL IN CYBER RISK MITIGATION Shutterstock, Inc. The time to prepare for a potential cyber

More information

Influence of Cyber Risk on the P&C Insurance Market

Influence of Cyber Risk on the P&C Insurance Market Influence of Cyber Risk on the P&C Insurance Market Edmund D Douglas, FCAS, MAAA June 2016 2016 Willis Towers Watson. All rights reserved. Agenda Cyber Risk and Fire Risk the Parallels State of P&C Insurance

More information

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014

More information

Insurance is an essential element in the operation of sophisticated national economies throughout the world today.

Insurance is an essential element in the operation of sophisticated national economies throughout the world today. THE ROLE OF INSURANCE INTERMEDIARIES Introduction The importance of insurance in modern economies is unquestioned and has been recognized for centuries. Insurance is practically a necessity to business

More information

Cyber Risks and Insurance Solutions Malaysia, November 2013

Cyber Risks and Insurance Solutions Malaysia, November 2013 Cyber Risks and Insurance Solutions Malaysia, November 2013 Dynamic but vulnerable IT environment 2 Cyber risks are many and varied Malicious attacks Cyber theft/cyber fraud Cyber terrorism Cyber warfare

More information

Cyber Liability & Data Breach Insurance Claims

Cyber Liability & Data Breach Insurance Claims NetDiligence 2013 Cyber Liability & Data Breach Insurance Claims Authored by: Mark Greisiger Sponsored by: AllClear ID Faruki Ireland & Cox PLL Kivu Consulting Introduction The third annual NetDiligence

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

Are Data Breaches a Real Concern? Protecting Your Sensitive Information. Phillips Auction House NY- 03/24/2015

Are Data Breaches a Real Concern? Protecting Your Sensitive Information. Phillips Auction House NY- 03/24/2015 Are Data Breaches a Real Concern? Protecting Your Sensitive Information Phillips Auction House NY- 03/24/2015 1 Agenda Current Data Breach Issues & Legal Implications Data Breach Case Study Risk Management

More information

Common Mistakes Made With Real Estate Errors and Omissions Insurance. Gallagher Real Estate & Hospitality

Common Mistakes Made With Real Estate Errors and Omissions Insurance. Gallagher Real Estate & Hospitality Common Mistakes Made With Real Estate Errors and Omissions Insurance Gallagher Real Estate & Hospitality MARCH 2015 Common Mistakes Made With Real Estate Errors and Omissions Insurance Complex real estate

More information

Benefits Administration: Should You Outsource or Manage In-House? As companies consider options, Health Care Reform may impact decisions

Benefits Administration: Should You Outsource or Manage In-House? As companies consider options, Health Care Reform may impact decisions Benefits Administration: Should You Outsource or Manage In-House? As companies consider options, Health Care Reform may impact decisions Contents Introduction 3 Findings 5 Which Areas of Benefits Administration

More information

Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies

Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies Marsh & McLennan Companies, Inc. 1166 Avenue of the Americas New York, NY 10036 +1 212 345 5000 Fax +1 212 345 4808 Testimony of PETER J. BESHAR Executive Vice President and General Counsel Marsh & McLennan

More information

Joe A. Ramirez Catherine Crane

Joe A. Ramirez Catherine Crane RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract

More information

cyber invasions cyber risk insurance AFP Exchange

cyber invasions cyber risk insurance AFP Exchange Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance

More information

ISO? ISO? ISO? LTD ISO?

ISO? ISO? ISO? LTD ISO? Property NetProtect 360 SM and NetProtect Essential SM Which one is right for your client? Do your clients Use e-mail? Rely on networks, computers and electronic data to conduct business? Browse the Internet

More information

CYBER RISK SECURITY, NETWORK & PRIVACY

CYBER RISK SECURITY, NETWORK & PRIVACY CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread

More information

Cyber Risks in Italian market

Cyber Risks in Italian market Cyber Risks in Italian market Milano, 01.10.2014 Forum Ri&Assicurativo Gianmarco Capannini Agenda 1 Cyber Risk - USA 2 Cyber Risk Europe experience trends Market size and trends Market size and trends

More information

ACE European Risk Briefing 2012

ACE European Risk Briefing 2012 #5 ACE European Risk Briefing 2012 IT and cyber risk respondent profiles The research was carried out between 13 April and 3 May 2012. The sample comprised 606 European risk managers, CROs, CFOs, COOs

More information

Risk Management and Solutions to the Current Financial Crisis

Risk Management and Solutions to the Current Financial Crisis 2013 Risk and Finance Manager Survey Full Report Executive Summary The Towers Watson Risk and Finance Manager Survey examines how North American companies use outside resources, tools and frameworks to

More information

Retail Roundtable: Payment System Cyber Attacks Preparing, Protecting, and Responding. June 11, 2014

Retail Roundtable: Payment System Cyber Attacks Preparing, Protecting, and Responding. June 11, 2014 Retail Roundtable: Payment System Cyber Attacks Preparing, Protecting, and Responding June 11, 2014 Panel Members Craig Hoffman Partner T: 513.929.3491 C: 513.227.3286 [email protected] www.dataprivacymonitor.com

More information

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised ACE USA Podcast Released June 24, 2010 How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised Moderator: Richard Tallo Senior Vice President, ACE North America Marketing

More information

Coverage Gaps, Deficiencies & Suggestions Report

Coverage Gaps, Deficiencies & Suggestions Report Your Company Logo Here Coverage Gaps, Deficiencies & Suggestions Report Today s Date ABC Enterprises 311 West 36th Street Kearney, NE 68847 Authored By: International Risk Management Institute, Inc. (IRMI)

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Investment in cyber insurance Lockton Companies

More information

Cybersecurity. Are you prepared?

Cybersecurity. Are you prepared? Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data

More information

Cyber Risks in the Boardroom

Cyber Risks in the Boardroom Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing

More information

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Linda Vincent, R.N., P.I., CITRMS Vincent & Associates Founder The Identity Advocate San Pedro, California The opinions expressed

More information

PCI Compliance for Healthcare

PCI Compliance for Healthcare PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?

More information

AN ENVOY WHITE PAPER TOTAL COST OF OWNERSHIP A SAAS B2B WHOLESALE ECOMMERCE PLATFORM

AN ENVOY WHITE PAPER TOTAL COST OF OWNERSHIP A SAAS B2B WHOLESALE ECOMMERCE PLATFORM AN ENVOY WHITE PAPER TOTAL COST OF OWNERSHIP A SAAS B2B WHOLESALE ECOMMERCE PLATFORM 02 Executive Summary There has been a great deal written about determining the total cost of ownership (TCO) of implementing

More information

Airmic Review of Recent Developments in the Cyber Insurance Market. & commentary on the increased availability of cyber insurance products GUIDE

Airmic Review of Recent Developments in the Cyber Insurance Market. & commentary on the increased availability of cyber insurance products GUIDE Airmic Review of Recent Developments in the Cyber Insurance Market & commentary on the increased availability of cyber insurance products GUIDE 1. Executive summary Airmic members have become increasingly

More information

impact ACTIONABLE INSIGHT FOR BUSINESS LEADERS / CYBER RISK / MARCH 2016 BOLSTERING INSURERS CYBER DEFENCES

impact ACTIONABLE INSIGHT FOR BUSINESS LEADERS / CYBER RISK / MARCH 2016 BOLSTERING INSURERS CYBER DEFENCES BOLSTERING INSURERS CYBER DEFENCES 02 At a time of unprecedented cyber attacks on insurers and an expanding cyber insurance market, US insurance supervisors have taken the lead in addressing insurers cyber

More information

ACE Advantage PRIVACY & NETWORK SECURITY

ACE Advantage PRIVACY & NETWORK SECURITY ACE Advantage PRIVACY & NETWORK SECURITY SUPPLEMENTAL APPLICATION COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY AND/OR NETWORK SECURITY LIABILITY COVERAGE. Please submit with

More information

NZI LIABILITY CYBER. Are you protected?

NZI LIABILITY CYBER. Are you protected? NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is

More information

ANATOMY of a DATA BREACH DISASTER. Avoiding a Cyber Catastrophe. June, 2011. Sponsored by:

ANATOMY of a DATA BREACH DISASTER. Avoiding a Cyber Catastrophe. June, 2011. Sponsored by: ANATOMY of a DATA BREACH DISASTER Avoiding a Cyber Catastrophe June, 2011 Sponsored by: ANATOMY of a DATA BREACH DISASTER Avoiding a Cyber Catastrophe An Advisen Special Report Sponsored by Chartis Security

More information