OECD PROJECT ON CYBER RISK INSURANCE
|
|
|
- Wilfrid Morrison
- 9 years ago
- Views:
Transcription
1 OECD PROJECT ON CYBER RISK INSURANCE Introduction 1. Cyber risks pose a real threat to society and the economy, the recognition of which has been given increasingly wide media coverage in recent years. Cyber insurance is one of the risk transfer mechanisms to address the financial costs that arise from cyber attacks, assisting in the recovery of those affected. In addition, cyber insurance can support risk reduction by promoting mitigation and prevention measures. 2. Since 2013, major corporations and retailers like Target, Home Depot, Sony, JP Morgan and Anthem Health have fallen victim to massive cyber-attacks on their databases. Consequential losses and disruptions impact not only the affected corporate. They can also affect persons whose data, identities and privacy may have been exposed or identities stolen, and beyond, with the whole ecosystem of corporations and networks at risk. The prevalence of cyber attacks has led managers to admit that not all cyber attacks can be prevented. 3. Cyber risk is high on many corporations and governments security agenda. The recently published National Security Strategy of the United Kingdom places cyber attack (including by other states, organised crime and terrorists) as one of the four highest priority risks for the United Kingdom over the next five years. On 13 February 2015, the White House Summit on Cybersecurity and Consumer Protection proposed several initiatives to make cybersecurity a national priority, with President Obama urging companies and governments to take stronger action to protect businesses and consumers from attacks and protect individuals privacy. Meanwhile, the legal and regulatory environment is being strengthened in many countries in order to protect consumers and incentivise companies to adopt a more proactive protection strategy. 4. These factors have driven the growth of the market for cyber protection, including through privacy and security products and services. They also explain the emergence of a specialised insurance market for cyber risks. While cyber insurance is offered to some extent in the United States and other markets, it remains limited relative to the magnitude of risks and market potential. Cyber risk insurance involves fast evolving and correlated risks which could be difficult to insure, accompanied by limited modelling capability and awareness of coverage and exclusions. Further, cyber risk can be compounded by the aggregation and correlation of risks. These barriers may be impeding the provision of this financial protection, leaving wide gaps in coverage and raising questions on how to better protect the privacy of businesses, individuals, and the intellectual property and databases of corporations and how to appropriately assign responsibility for damages after a breach. 5. The importance of cyber insurance is increasing, but there has yet to be an in depth analysis of policy issues surrounding the development of a sound cyber insurance market with market conduct safeguards. 6. This project proposes to look at various facets of the market and the issues that may arise as the market evolves and develops. The OECD s Insurance and Private Pensions Committee (IPPC) can draw on its expertise in the areas of disaster and terrorism risks management to support the analysis of this market
2 given the similarity of some of the issues (e.g. challenges to insurability of risks, widespread underinsurance, etc.), as well as draw on relevant work on financial consumer protection. 7. The project will consist of three reports which will be carried out over the next 18 to 24 months. The outcome of the project can be amalgamated and discussed in an event on the topic in Project on cyber risk insurance 8. The project on cyber risk insurance would aim to better understand cyber risk and insurance, and how cyber security and financial protection against losses from cyber attacks could be improved as the market develops. Such a policy discussion would require a better understanding of the market, and how the improvements in awareness of risks and potential mitigation options expected to result from further penetration of cyber insurance might enhance the level of cyber security more generally. The project is thus focussed on areas with possible regulatory and policy implications, as well as areas in which greater understanding of policies might benefit the industry. This project does not aim to standardise market practices per se, but provide a basis to enable greater transparency of cyber insurance contracts and subsequent improved risk awareness by policyholders. 9. This project will contain three reports (which could constitute chapters in a final publication): Cyber risk insurance: the market and nature of available insurance coverage; Awareness of cyber risks and the role of insurance in risk measurement, mitigation and prevention; and Regulatory and policy issues relevant to the development cyber insurance markets. 10. In particular, the project will try and focus to some extent on how consumer protection can be enhanced with cyber insurance, in particular in relation to third party liability, and what elements support or hamper this. In addition, the policy discussion could lead to insight into public policy measures and considerations that could affect the provision of cyber insurance, including possible areas of international cooperation going forward. 11. For its part, the International Association of Insurance Supervisors (IAIS) s Financial Crime Task Force will be looking at understanding developments in the cyber insurance market, and will be developing an Issues Paper which explores the area of cyber-crime risks to the insurance sector. The Issues Paper will focus on the protection of the private information of insurance customers and the mitigation of fraud committed through cyber-attacks and will identify areas for further work in providing guidance for supervisors. This project will be structured to compliment the work that is expected by the IAIS. 12. For the purpose of the project, a short questionnaire will be sent to delegates to collect information on the relevant initiatives on cyber security and cyber insurance. In addition and more broadly, a questionnaire will be sent to insurers to collect information on their gross written premiums, scope of protection and exclusion, risk assessment methods, pricing, level of claims paid out, and challenges moving forward. I. Cyber risk insurance: the market and nature of insurance coverage available 13. The first part of the project would provide an overview of the cyber insurance market as it stands, market segments which may not benefit from coverage as well as the insurance policies being offered, in particular the scope of coverage and exclusion included in those policies. The intention would not be to
3 look into the trend of cyber attacks, which are discussed extensively by other expert groups, but to look at the level of financial protection being offered. The market is at its nascent stage and currently mainly focussed on corporate policyholders. However, as it develops, and as the frequency and severity of attacks change, policies being offered are likely to evolve, which may have implications that require careful consideration. 14. The types of policyholders taking up the cyber risk option will be analysed, feeding into the discussion in the second part of the project on consumer protection aspects. Although cyber insurance is a relatively new product and policy language is yet to be standardised, the report does not intend to standardise policies, but look into ways in which protection is being offered on the market, and the elements that are being incorporated into policies. By identifying elements typical in core cover and more specific optional cover, the direction in which the market is developing can be analysed as well as how transparency of coverage may be improved. Ambiguities in the definition of cyber risk, the scope of insurance cover, and triggers activating payment may create uncertainties on the exact perimeter of events insured, and can lead to gaps in coverage and a general lack of understanding of cyber insurance coverage and benefits. 15. The report will in particular try to look at some sample policies in detail, to understand the extent of their coverage and premium levels. The level of coverage and premium levels would also provide an indication of the types of cyber insurance policyholders. Practices in the market which would improve the definition of cyber risks and the extent of insurance coverage, in terms of transparency and comparability of contracts, could also be discussed. In particular, whether smaller firms, which lack technical expertise to conduct in-depth audits of their cyber vulnerabilities, are able to understand the extent of their cyber insurance coverage and whether adequate protection is being offered will be considered. 16. An additional facet will be to understand any barriers to the provision of cyber insurance. While some markets, in particular the US, are more developed, other markets have not developed in tandem with the potential risk exposure of the market. Understanding the background to this lack of development may assist in understanding the market conditions required to providing cyber insurance. 17. The report will analyse the extent to which terrorism risk insurance would cover cyber terrorism. While terrorism risk insurance may not, by default, cover cyber risks, some of the policies may have the possibility of covering a large extent of cyber attacks attributed to terrorism. 18. The report will therefore include the following sections: Overview of the market size and penetration levels: market capacity, take-up rates, characteristics of policyholders Trends in cyber insurance policies: extent of cover (events/financial limits) and exclusions, pricing Sample policies for cyber risk: protection and premium levels Cover of cyber terrorism losses by terrorism risk insurance II. Risk awareness of cyber risks and the role of insurance in risk measurement, mitigation and prevention 19. This part of the project will look into how cyber insurance could contribute to risk measurement, mitigation and prevention, and consider some consumer protection issues. Cyber insurance provides an opportunity for preventative measures to be encouraged through the use of risk-based premiums and
4 provision of advice on risk mitigation. Insurers could also contribute to the measuring of cyber risk. The possibility of security audits to determine premium levels has been discussed during the Committee meeting, and could lead to better privacy and security of information technology systems. 20. Cyber insurance can provide an incentive to enhance cyber security. A better understanding of the current practices of risk assessment and mitigation, what is being taken into account for premiums and the possible correlated risks could lead to better preparation towards cyber attacks by potential policyholders. The possibility of insurers carrying out in-depth cyber security audits to assess their client s security tools and practices across all activities i.e., as part of underwriting and exposure monitoring, policyholders could be required to undertake audits could amplify the risk reduction benefits of insurance. Insurers can incentivise prevention and mitigation by reduced premiums and extensions on coverage. Insurers can also contribute to the measurement of risk through modelling efforts and better data collection. 21. The OECD s Working Party on Security and Privacy in the Digital Economy is likely to also look into issues relevant to cyber insurance, being the expert group on security and privacy, and a possible collaboration on this topic could lead to a better informed discussion in this area. The Committee may wish to have a horizontal approach in this part of the project, possibly working with the Working Party on Security and Privacy in the Digital Economy on security measures which could support risk mitigation and underwriting. 22. While corporates, in particular large ones, may have the institutional and financial capacity to develop appropriate security measures towards cyber risk, in addition to purchasing cyber insurance, smaller corporates and individuals remain exposed to cyber risks both directly and indirectly, with the potential of correlated risks. They would be exposed directly through possible cyber attacks on their information technology system, and indirectly through privacy breaches of systems with their personal details. Also, cloud technology, which many businesses and individuals widely use, is exposed to cyber risks, although improved security at the cloud level may increase overall security. While policyholders of cyber insurance are, at least in the current market, mainly companies, those affected are often consumers/clients who are dependent on the security measures taken by the company to whom they provide their personal details. It would be beneficial for the Committee to consider policy issues arising from breaches of privacy and how cyber insurance provides coverages. For example, from understanding how cyber insurance policies cover liability arising from cyber breaches towards individuals, to how damages could be reasonably covered, current practices could be reviewed to better understand good practices going forward. In particular, the types of security measures which would address risk mitigation and prevention, and support underwriting of the risks, could be discussed. 23. The report will include the following sections: The risk mitigation and prevention measures incorporated into cyber policies and how risk-based premiums are being determined: security audits and governance arrangements What efforts are being made to better measure cyber risk including correlated accumulation risk First and third party liability of cyber insurance: protection being offered and its adequacy Consideration of how security and consumer protection could be enhanced through cyber insurance Awareness of cyber insurance and consumer protection: how awareness can be raised for better protection
5 III. Regulatory and policy issues related to the development cyber insurance markets 24. While cyber insurance is a relatively new market, the number of cyber attacks and breaches of personal data has led to increased interest in policy measures related to protecting against cyber attacks. While measures taken specifically to address cyber insurance have been limited, there have been a number of policy discussions relevant to cyber insurance. 25. This part of the project will look into relevant regulatory and policy issues related to the development of cyber insurance markets. Discussions that took place in the first two parts of the project will be reflected upon to consider areas in which further discussion and policy measures may be necessary. 26. The US and UK have been actively engaging in policy discussions on how to address the ascent of cyber insurance, in particular for attacks on critical infrastructure with possible national security implications. How the government wishes to support improved security and address financial losses as a result of cyber attacks will have an important implication on the development of cyber insurance. Relevant regulatory measures, or market best practices being promoted to improve cyber security and risk transfer of cyber risk, will be discussed, including the nomination of a chief (information) security officer, introduction of mandatory cyber insurance in limited cases and possible tax incentives. The role of data protection legislation and notification requirements will also be analysed. 27. The absence of relevant data series on past losses, the limited actuarial information available on the frequency and magnitude of actual and potential cyber security incidents, and the ever-changing form of cyber threats are major challenges to cyber risk insurability. How transparency and monitoring of the market could be improved could be reviewed. 28. Some general observations on how the solvency of insurers might be affected by the provision of cyber insurance and whether there could be a sector wide impact will be analysed. While both solvency and stability impact of cyber insurance are not an immediate policy concern, the lack of data, risk modelling capability and expertise could create barriers to appropriately monitor the market. An analysis of how a large and/or multiple attacks might implicate insurers could also be considered. As the IAIS will be considering possible supervisory guidance in regard to cyber attacks, this report will observe how cyber risk-related claim payouts could impact insurers solvency. 29. The report will include the following sections: Regulatory discussions and measures taken in relation to cyber insurance, including notification requirements in case of a breach Monitoring approaches that could improve transparency and monitoring of the cyber insurance market Possible insurer solvency and stability considerations Possible policy recommendations and/or issues for the future For interest and contact: Mamiko Yokoi-Arai (tel: [email protected])
Cyber-Insurance Metrics and Impact on Cyber-Security
Cyber-Insurance Metrics and Impact on Cyber-Security Sometimes we can... be a little bit more vigorous in using market-based incentives, working with the insurance industry, for example... DHS Secretary
Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature
Demystifying Cyber Insurance Jamie Monck-Mason & Andrew Hill Introduction What is cyber? Nomenclature 1 What specific risks does cyber insurance cover? First party risks - losses arising from a data breach
CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY
CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY October 2015 CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY Global reinsurer PartnerRe has once again collaborated with Advisen to conduct a comprehensive
Care Providers Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management
Care Providers Protecting your organisation, supporting its success Risk Management Insurance Employee Benefits Investment Management Care providers are there to help those in need. But who helps the care
Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace
Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace Testimony of Ben Beeson Vice President, Cyber Security and Privacy Lockton
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
The promise and pitfalls of cyber insurance January 2016
www.pwc.com/us/insurance The promise and pitfalls of cyber insurance January 2016 2 top issues The promise and pitfalls of cyber insurance Cyber insurance is a potentially huge but still largely untapped
Who s next after TalkTalk?
Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012
GUIDANCE NOTE FOR DEPOSIT-TAKERS Operational Risk Management March 2012 Version 1.0 Contents Page No 1 Introduction 2 2 Overview 3 Operational risk - fundamental principles and governance 3 Fundamental
Reducing Cyber Risk in Your Organization
Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than
Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance
Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance Today s agenda Introductions Cyber exposure overview Cyber insurance market and coverages Captive cyber insurance
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
Cybersecurity. Considerations for the audit committee
Cybersecurity Considerations for the audit committee Insights on November 2012 governance, risk and compliance Fighting to close the gap Ernst & Young s 2012 Global Information Security Survey 2012 Global
2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE
2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2015 2015 Network Security & Cyber Risk Management: The FOURTH
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response
Cybersecurity and Hospitals What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response This resources was prepared exclusively for American Hospital Association members by Mary
Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks
Please cite this paper as: OECD (2012), Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks, OECD Digital Economy Papers, No. 210, OECD Publishing.
Cyber security: Are consumer companies up to the challenge?
Cyber security: Are consumer companies up to the challenge? 1 Cyber security: Are consumer companies up to the challenge? A survey of webcast participants kpmg.com 1 Cyber security: Are consumer companies
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
Cyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
Defining the Gap: The Cybersecurity Governance Study
Defining the Gap: The Cybersecurity Governance Study Sponsored by Fidelis Cybersecurity Independently conducted by Ponemon Institute LLC Publication Date: June 2015 Ponemon Institute Research Report Defining
Insurance implications for Cyber Threats
Lillehammer Energy Claims Conference Lillehammer March 7, 2014 Insurance implications for Cyber Threats How enterprises need to prepare for the inevitable JLT is one of the world s largest providers of
ACE European Risk Briefing 2012
#5 ACE European Risk Briefing 2012 IT and cyber risk respondent profiles The research was carried out between 13 April and 3 May 2012. The sample comprised 606 European risk managers, CROs, CFOs, COOs
OECD GUIDELINES FOR PENSION FUND GOVERNANCE
OECD GUIDELINES FOR PENSION FUND GOVERNANCE These Guidelines were approved by the Working Party on Private Pensions on 5 June 2009. OECD GUIDELINES FOR PENSION FUND GOVERNANCE 1 I. GOVERNANCE STRUCTURE
Managing cyber risks with insurance
www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive
Charities & Not for Profit Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management
Charities & Not for Profit Protecting your organisation, supporting its success Risk Management Insurance Employee Benefits Investment Management Charities are there to help those in need. But who helps
impact ACTIONABLE INSIGHT FOR BUSINESS LEADERS / CYBER RISK / MARCH 2016 BOLSTERING INSURERS CYBER DEFENCES
BOLSTERING INSURERS CYBER DEFENCES 02 At a time of unprecedented cyber attacks on insurers and an expanding cyber insurance market, US insurance supervisors have taken the lead in addressing insurers cyber
PRIORITIZING CYBERSECURITY
April 2016 PRIORITIZING CYBERSECURITY Five Investor Questions for Portfolio Company Boards Foreword As the frequency and severity of cyber attacks against global businesses continue to escalate, both companies
Exercising Your Enterprise Cyber Response Crisis Management Capabilities
Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.
Insurance Europe key messages on the European Commission's proposed General Data Protection Regulation
Position Paper Insurance Europe key messages on the European Commission's proposed General Data Protection Regulation Our reference: SMC-DAT-12-064 Date: 3 September 2012 Related documents: Proposal for
Rogers Insurance Client Presentation
Rogers Insurance Client Presentation Network Security and Privacy Breach Insurance Presented by Matthew Davies Director Professional, Media & Cyber Liability Chubb Insurance Company of Canada [email protected]
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind
Page1 Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind The use of electronic medical records (EMRs) to maintain patient information is encouraged today and
Technology and Cyber Resilience Benchmarking Report 2012. December 2013
Technology and Cyber Resilience Benchmarking Report 2012 December 2013 1 Foreword by Andrew Gracie Executive Director, Special Resolution Unit, Bank of England On behalf of the UK Financial Authorities
Cyber Risk Management
Cyber Risk Management A short guide to best practice Insight October 2014 So what exactly is 'cyber risk'? In essence, cyber risk means the risk connected to online activity and internet trading but also
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become
Prudential Practice Guide
Prudential Practice Guide LPG 240 Life Insurance Risk and Life Reinsurance Management March 2007 www.apra.gov.au Australian Prudential Regulation Authority Disclaimer and copyright This prudential practice
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015
Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key
London Business Interruption Association Technology new risks and opportunities for the Insurance industry
London Business Interruption Association Technology new risks and opportunities for the Insurance industry Kiran Nagaraj Senior Manager, KPMG LLP February 2014 Agenda Introduction The world we live in
The NIST Cybersecurity Framework Encouraging NIST Adoption Via Cost/Benefit Analysis
The NIST Cybersecurity Framework Encouraging NIST Adoption Via Cost/Benefit Analysis Paul A. Ferrillo March 2015 The NIST Cybersecurity Framework Encouraging NIST Adoption Via Cost Benefit Analysis Until
Secure by design: taking a strategic approach to cybersecurity
Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk
How To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
Cyber/ Network Security. FINEX Global
Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over
IOPS GOOD PRACTICES IN RISK MANAGEMENT OF ALTERNATIVE INVESTMENTS BY PENSION FUNDS
. IOPS GOOD PRACTICES IN RISK MANAGEMENT OF ALTERNATIVE INVESTMENTS BY PENSION FUNDS June 2010 1 GOOD PRACTICES IN RISK MANAGEMENT OF ALTERNATIVE INVESTMENTS BY PENSION FUNDS 1 Introduction 1. The objective
Cyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
GUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
CYBER RISK SECURITY, NETWORK & PRIVACY
CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread
The Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
Cybersecurity Strategic Consulting
Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with
How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner [email protected] 202.669.0495
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner [email protected] 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity
The Importance of Senior Executive Involvement in Breach Response
The Importance of Senior Executive Involvement in Breach Response Sponsored by HP Enterprise Security Services Independently conducted by Ponemon Institute LLC Publication Date: October 2014 The Importance
Regulations in General Insurance. Solvency II
Regulations in General Insurance Solvency II Solvency II What is it? Solvency II is a new risk-based regulatory requirement for insurance, reinsurance and bancassurance (insurance) organisations that operate
System of Governance
CEIOPS-DOC-29/09 CEIOPS Advice for Level 2 Implementing Measures on Solvency II: System of Governance (former Consultation Paper 33) October 2009 CEIOPS e.v. Westhafenplatz 1-60327 Frankfurt Germany Tel.
Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
Insurance Guidance Note No. 14 System of Governance - Insurance Transition to Governance Requirements established under the Solvency II Directive
Insurance Guidance Note No. 14 Transition to Governance Requirements established under the Solvency II Directive Date of Paper : 31 December 2013 Version Number : V1.00 Table of Contents General governance
Where insights lead Cybersecurity and the role of internal audit: An urgent call to action
Where insights lead Cybersecurity and the role of internal audit: An urgent call to action The threat from cyberattacks is significant and continuously evolving. One estimate suggests that cybercrime could
Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age
Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: August 2013
EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND?
EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND? ABOUT JLT SPECIALTY JLT Specialty Insurance Services is the U.S. platform of JLT Group, the leading specialty business adivsory
Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013
Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy s gas and electric utilities collaborate with industry leaders and a wide range of
3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.
Cybersecurity: Minimizing Risk & Responding to Breaches March 5, 2015 Andy Chambers Michael Kelly Jimmie Pursell Scope of Problem Data Breaches A Daily Phenomenon Anthem JP Morgan / Chase Sony Home Depot
Risk-Based Capital. Overview
Risk-Based Capital Definition: Risk-based capital (RBC) represents an amount of capital based on an assessment of risks that a company should hold to protect customers against adverse developments. Overview
Cyber Threats and the Insurance Response
Cyber Threats and the Insurance Response Scott Reeves & Laurence Yan Munich Reinsurance Company This presentation has been prepared for the Actuaries Institute 2014 General Insurance Seminar. The Institute
Risks and uncertainties
Risks and uncertainties Our risk management approach We have a well-established risk management methodology which we use throughout the business to allow us to identify and manage the principal risks that
Solvency ii: an overview. Lloyd s July 2010
Solvency ii: an overview Lloyd s July 2010 Contents Solvency II: key features Legislative process Solvency II implementation Conclusions 2 Solvency II: key features 3 Solvency II the basics Introduces
Cyber Security Evolved
Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are
CYBERSECURITY RISK MANAGEMENT
CYBERSECURITY RISK MANAGEMENT Evan Wolff Maida Lerner Peter Miller Kate Growley 233 Roadmap Cybersecurity Risk Overview Cybersecurity Trends Selected Cybersecurity Topics Critical Infrastructure DFARS
Top Fraud Trends Facing Financial Institutions
Top Fraud Trends Facing Financial Institutions Presented on: October 7, 2015, 2-3 ET Presented by: Ann Davidson - VP of Risk Consulting at Allied Solutions Webinar Agenda 1. Fraud trends in 2015 and beyond
Cybersecurity and the Romanian business environment in the regional and European context
KPMG Legal Cybersecurity and the Romanian business environment in the regional and European context Developing a cybersecurity culture for the users of digital and communications systems has become a mandatory
New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector
New York State Department of Financial Services Report on Cyber Security in the Insurance Sector February 2015 Report on Cyber Security in the Insurance Sector I. Introduction Cyber attacks against financial
DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE
DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE ACC-Charlotte February 4, 2015 THIS WILL NEVER HAPPEN TO ME! Death, Taxes & Data Breach Not just Home Depot, Target or Sony Do you employ the next
THE NEW INTERNATIONALS. Updating perceptions of SMEs in an increasingly globalised world
THE NEW INTERNATIONALS Updating perceptions of SMEs in an increasingly globalised world Contents Introduction 5 Born Global 6 International Futures 7 Supporting UK SMEs 8 UK Regions 9 Conclusion 10 About
Chairman s Statement. Contents & Introduction. Introduction
Business Plan 2016 Contents Chairman s & Introduction Statement Introduction Chairman s Statement About the Commission Our major priorities for 2016 Facilitating market access & other benefits to industry
integrating cutting-edge security technologies the case for SIEM & PAM
integrating cutting-edge security technologies the case for SIEM & PAM Introduction A changing threat landscape The majority of organizations have basic security practices in place, such as firewalls,
