Cyber-insurance: Understanding Your Risks
|
|
|
- Brenda Joseph
- 10 years ago
- Views:
Transcription
1 Cyber-insurance: Understanding Your Risks Cyber-insurance represents a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some high-level thoughts and recommendations for understanding this area. Business lawyers are often involved with risk management and insurance coverage issues. They are expected to be familiar with the types of insurance and the scope of coverage, whether in the general operation of the client s businesses, the negotiation of contracts in which they are a vendor or a purchaser of services, or in the general assessment of risk management. Business clients typically purchase insurance products for property, personal injury, and general commercial liability coverage, and may also obtain coverage for certain acts of directors and officers, errors and omissions coverage, or other employee practices. Purchasing and maintaining these general types of insurance are based on a business s typical assessment of risks. Insurance coverage is expected to protect clients from potential liabilities they generally understand or have come to expect. Real-world use of the insurance is understood in typical liability scenarios such as car accidents with employer-owned vehicles, advertising injury claims, shareholder derivative actions, or claims by former employees for wrongful termination (to name a few). Clients may also have actual experience of having their business evaluated during the underwriting process as a part of purchasing insurance contracts over the years. When dealing with cyber-insurance, however, there is a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some high-level thoughts and recommendations for understanding this area. What is Cyber-insurance? While the term cyber-insurance is often used, it is not a particularly useful term. The term comes from the terminology associated with cyberspace, which is often used to refer to those aspects of business and practice involving technology and the Internet. The use of the terms by such groups as the American Bar Association Business Law Sections Cyberspace Law Committee really groups together a number of very different issues, business models, and legal principles. For purposes of understanding the appropriate insurance to address the risks our clients may face, we use that term only as a general category. We generally understand the purposes of coverage such as liability and property insurance, but cyber-insurance can apply to a variety of products that may or may not be helpful to an individual company, and may not address the real risks. Moreover, cyber-insurance is a new product to the insurance marketplace, and the types of coverage available vary widely by insurer. This is partly due to the fact that the evaluation and underwriting of
2 cyber risks is a developing area of insurers as the markets work to develop insurance products that will help businesses address the financial consequences of cyber risks and liability, and it is due in part to the fact that there are no standardized coverage forms like those typically used in the property and casualty arena. As a result, each market, or carrier, may have its own coverage, which means, in turn, that each policy will likely have different insuring clauses the provision in the insurance contract that grants the insured its scope of coverage as well as different critical definitions, limitations and exclusions, and endorsements that are available for additional premium. Understanding important insurance concepts is that much more critical when reviewing a quote for cyber-insurance and, at a minimum, a specimen policy should be requested and thoroughly analyzed before any commitment is made to purchase to the insurance contract. Cyber-insurance may be used to address liabilities to third parties or costs to the insured for business events that may transpire. A good example involves a potential data breach of personal information. Whether a company s system is hacked or data stored on a computer or external storage media is stolen, the company may have obligations of notification and is potentially liable for damages to third parties. The company which has lost the data may incur costs related to the assessment of the situation, forensic services to evaluate what happened and what was lost, notification expenses to the affected persons, or potential expenses related to addressing the negative publicity that may occur. Each of these is a separate category of risk and liability that may or may not be covered under a specific insurance policy. To properly evaluate the coverage needed, the business should categorize and understand its exposure for its own losses and internal expenses, and consider potential liabilities to third parties based on an assessment of that business. Liability to third parties may be imposed by law or regulation, or may exist based on the undertakings of the company in its contracts with customers or other entities. A useful partner in this process is a knowledgeable broker who understands the scope of the risk and the insurance products available to cover that risk. During the research for this article, we reached out to Larry Harb, the president of IT Risk Managers, Inc. in Lansing, Michigan. Unlike traditional business insurance, says Harb, cyber insurance policies are unique to the issuing carrier; nothing is standard in the industry at this point in time. This includes the terms and conditions of coverage, the definitions used to describe coverage, or the business class appetite of the carrier. Therefore, when you are looking to insure against the cyber risks and exposures, you need to understand these risks (or use an insurance specialist that completely understands the risks and the particular exposures of your company) and be able to evaluate the policies that will best meet your company s specific cyber insurance needs. Identification and Assessment of Risk The first step in this process should be an inventory of the types of systems used and the kind of data maintained by the company. If the company collects and stores personal information that contains financial, social security, or health information, the protection of those categories of information is
3 specifically regulated under various laws, including Graham-Leach-Bliley¹ and H I PA A.² Each of those statutes requires that persons collecting and storing personal information maintain the security and integrity of those storage systems and protect against unauthorized access to protected information. For personally identifiable information, 47 states have also passed notification laws that require a company to notify persons whose information has been stolen, lost, or otherwise compromised.³ The next step is to identify where the company maintains data and how the company operates its systems. Is data stored within company systems in its own secure environment? Is the data stored in a cloud storage environment? Is processing of data done by third parties or in the cloud? Where are the company s vulnerabilities and risks if systems are accessed by an unauthorized person, or if someone does damage to the electronic systems and data. These questions will help identify whether coverage is necessary for first-party liability. In other words, does the company need insurance to cover its costs associated with the loss of availability of its systems or data, breaches of confidentiality, or comprised data integrity? A third area involves the company s responsibilities to third parties. Has the company entered into agreements by which it must indemnify a third party for losses associated with services or goods supplied by the company or has it undertaken other responsibilities contractually. What are the potential claims that may result? Are those risks just part of the normal cost of doing business, or should the company hedge that risk by obtaining insurance coverage for all or part of the potential exposure? For example, if the company provides services at a customer s site, and the contract requires the company to indemnify the customer for negligent acts of those employees that cause personal injury or property damage, the potential liability may be covered by the commercial liability policy. The analysis is different if the company represents that its storage or processing of data will be in compliance with a regulatory framework (HIPAA, for example). If personally identifiable information in the control of the company is accessed by a hacker, the company may be liable to its customer for any costs, liabilities or regulatory fines incurred by the customer resulting from that loss of protected data. While the above inquiry is certainly not comprehensive, it gives you a flavor of the kind of inquiry that is necessary. The risk assessment must be done by people knowledgeable about the industry and about ¹ Gramm-Leach-Bliley Act (GLB; Public Law , 15 U.S.C. 6801, et seq.). ² Health Insurance Portability and Accountability Act of 1996 (HIPAA; Pub. L , 110 Stat. 1936, enacted August 21, 1996). ³ Michigan s New Data Breach Notification Act, Michigan Business Law Journal (Spring 2007); Data Breach Developments, Michigan Business Law Journal (Fall 2011)
4 what specific activities are being undertaken by the company. In addition, underwriters looking at a company s exposure to risk will thoroughly examine these issues, and underwriting will evaluate how a company manages its electronic security. All of these factors will be a part of the insurer s evaluation of what premium to charge for cyber-insurance. Potential Areas of Required Coverage After the assessment of the risk, the next step is to identify the affirmative actions that would be required by a company that has an incident and/or all liabilities that could ensue. Among the specific categories of potential costs are the following: Notification expenses to third-parties associated with data breach that may be required by state law, GLB or HIPAA Cost incurred by the company in investigating the breach or security incident that caused the problem, including potential costs for forensic investigations by outside professionals (What happened? How did it happen?) Cost associated with data restoration if the security breach resulted in electronic data loss, including applications and data bases Potential costs to protect individuals whose information was compromised for credit monitoring Fines and regulatory actions that are the direct result of the system breach Costs or losses associated with business interruption Content and advertising injury associated with electronic media Each of these items can have a number of variations. For example, a company that loses data and violates the privacy of its customers may be subject to regulatory action or fines by the Federal Trade Commission; a company that has a security incident associated with its credit card systems may be subject to fines from the payment card industry (PCI). Similarly, the loss of data will typically not constitute physical damage that would bring in coverage under a commercial general liability policy; specific coverage for that risk must be placed if it is important to the business. A final comment relates to the specific amounts of coverage under an overall policy. While the policy may be written for an overall maximum amount per occurrence, there will typically be sub-limits within the policy for coverage as to specific expense or liability items. Those sub-limits of coverage, notification expenses for example, need to be considered in light of the potential costs and exposure based on what is actually maintained by the company. Exclusions and Limits In the payment card example, one of the developing areas in coverage relates to fines associated with payment card industry compliance penalties. These penalties are assessed by Master Card or Visa without any formal process for a merchant to contest the fines. A policy that excludes fines is not much
5 help if that is the most significant liability; this is an example of a risk that probably requires a specific endorsement on a policy for any insured that has credit card information. Another point that has generated significant discussion involves limitations in coverage to those expenses associated with or actions required by law. For example, if data involving a company s customers is compromised (such as the theft of personally identifiable information), the company may seek to protect its customers by arranging for free credit monitoring for a period of time. However, if there is no law that requires credit monitoring protection for affected persons, as is currently the case, then a policy limitation for expenses that are required by law would exclude the cost associated with credit monitoring. This may be the case even if it was deemed appropriate by the insured or was part of a settlement with a regulatory authority. Data breach incidents can be caused by bad actors, but they also may be caused by the actions of your client s employees. Therefore, you also want to consider whether the coverage has exclusions for insider actions, and you will want to understand which employees might be excluded from coverage. Does the policy contain limitations for damages or expenses resulting from actions by employees for either intentional or negligent acts? Underwriting the risk by carriers has also undergone a change. Larry Harb says that back in the 1990s when we wrote cyber policies, carriers would not write a risk without the insured having an assessment, or what was called the ethical hack performed by a third party. This would essentially be a test of integrity of the insured s systems. Today the process is different. Now the assessment is accomplished during the underwriting process, which includes a self-assessment of risk. The application (including the assessment) now has a warranty statement included. The company must provide this warranty about its processes and systems to the carrier, making it a part of the policy. Therefore, any false statements will give the carrier reason to automatically deny a claim. In a similar vein, there is a large body of law in Michigan, and consistently followed by a majority of jurisdictions, that a misstatement in an insurance application or omission that would have caused the insurer to take a different position, like not issue the policy, is grounds to void the policy as though it were never issued. The consequence of such an action by an insurer could be devastating to the insured since it would be left to face an otherwise covered loss without insurance coverage. That concept is likely to extend to the cyber-insurance area as insurance coverage cases involving cyber risks begin to make their way through the courts. Attacks on Critical Infrastructure On a societal basis, for the risks associated with data breach, hacking of credit card numbers and personal information is insignificant compared to the risks to the national and global critical infrastructure. The US Department of Homeland Security has identified 18 sectors deemed to be vital to our nation; the failure of any sector through attack, negligence, or lack of investment would have a significant detrimental effect.¹ ¹ See The sectors identified are Food and Agriculture, Banking and Finance, Chemical, Commercial Facilities, Communications, Critical Manufacturing, Dams, Defense Industrial Base, Emergency Services, Energy, Government Facilities,
6 Healthcare and Public Health, Information Technology, National Monuments and Icons, Nuclear Reactors, Materials, and Waste, Postal and Shipping, Transportation Systems, and Water For perpetrators wanting to exact destruction for political or other purposes (as opposed to financial or trade secret theft), these areas of risk need special attention. Similarly, the type of industry and the location of the company will be a significant factor. Consider the risk profiles of an electric transmission company in a metropolitan area compared to a rural farming operation. The need for protection is considerably different. For many businesses that have a realistic risk, terrorism coverage or riders should be standard operating procedures. This coverage is intended to address these risks. Many of the evolutionary changes in coverage have forced an examination of terrorism coverage, act-of-war exclusions, and related issues. Consider the experience of the victims of the World Trade Center attacks. In those cases, insurers did not seem disposed to deny coverage, but that cannot be assumed in the future, and must be assessed by the company. While coverage in this context is usually considered for data breach, business interruption, or bricks and mortar problems caused by criminal enterprises or competitors, attacks on critical infrastructure may result from governmental actors from around the world. Cyber warfare is now considered to be a legitimate area of offense and defense, and the impact on critical infrastructure may be significant.² This will be a developing area, and there are no good answers as to how this will affect businesses in the future. Conclusions With the inability of Congress to take a realistic approach to cybersecurity legislation,³ business is left to protect itself against cyber risks. Businesses that are looking for coverage associated with data and system security, breaches, data loss, and the other items discussed in this article need to first evaluate the actual areas of risk, the possible actions that would be required in the event of a security incident, and the scope of expenses or liabilities that might be incurred. Consulting with an experienced professional in this area to ensure that appropriate coverage is placed to address these risks may be the best investment that a business could make. ² See Stuxnet was work of U.S. and Israeli experts, officials say, The Washington Post, June 2, The article can be found at ³ See Westby, Jody, Congress Needs to Go Back To School on Cyber Legislation, which can be found athttp:// Reprinted with permission of authors Michael S. Khoury and Mark G. Cooper-Attorneys
Joe A. Ramirez Catherine Crane
RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract
Data security: A growing liability threat
Data security: A growing liability threat Data security breaches occur with alarming frequency in today s technology-laden world. Even a comparatively moderate breach can cost a company millions of dollars
Data Breach Cost. Risks, costs and mitigation strategies for data breaches
Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,
GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029
Cyber Liability Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029 Today s Agenda What is Cyber Liability? What are the exposures? Reality of a
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
Understanding Professional Liability Insurance
Understanding Professional Liability Insurance Definition Professional liability is more commonly known as errors & omissions (E&O) and is a form of liability insurance that helps protect professional
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
Cyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
Cyberinsurance: Insuring for Data Breach Risk
View the online version at http://us.practicallaw.com/2-588-8785 Cyberinsurance: Insuring for Data Breach Risk JUDY SELBY AND C. ZACHARY ROSENBERG, BAKER HOSTETLER LLP, WITH PRACTICAL LAW INTELLECTUAL
What would you do if your agency had a data breach?
What would you do if your agency had a data breach? 80% of businesses fail to recover from a breach because they do not know this answer. Responding to a breach is a complicated process that requires the
MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS
MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson
Data Breach and Senior Living Communities May 29, 2015
Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs
ISO? ISO? ISO? LTD ISO?
Property NetProtect 360 SM and NetProtect Essential SM Which one is right for your client? Do your clients Use e-mail? Rely on networks, computers and electronic data to conduct business? Browse the Internet
cyber invasions cyber risk insurance AFP Exchange
Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance
Cyber and CGL Insurance Coverage for Data Breach Claims
Cyber and CGL Insurance Coverage for Data Breach Claims Paula Weseman Theisen, Partner Data breach overview Definition of data breach/types Data breach costs Data breach legal claims and damages Cyber-insurance
Cyber and data Policy wording
Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and
CYBER SECURITY SPECIALREPORT
CYBER SECURITY SPECIALREPORT 32 The RMA Journal February 2015 Copyright 2015 by RMA INSURANCE IS AN IMPORTANT TOOL IN CYBER RISK MITIGATION Shutterstock, Inc. The time to prepare for a potential cyber
ACE Advantage PRIVACY & NETWORK SECURITY
ACE Advantage PRIVACY & NETWORK SECURITY SUPPLEMENTAL APPLICATION COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY AND/OR NETWORK SECURITY LIABILITY COVERAGE. Please submit with
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
Cyber and Data Security. Proposal form
Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which
Airmic Review of Recent Developments in the Cyber Insurance Market. & commentary on the increased availability of cyber insurance products GUIDE
Airmic Review of Recent Developments in the Cyber Insurance Market & commentary on the increased availability of cyber insurance products GUIDE 1. Executive summary Airmic members have become increasingly
Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?
Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for? Authored by Neeraj Sahni and Tim Stapleton Neeraj Sahni is Director, Insurance Channel at Kroll Cyber Investigations
Cyber-Insurance Metrics and Impact on Cyber-Security
Cyber-Insurance Metrics and Impact on Cyber-Security Sometimes we can... be a little bit more vigorous in using market-based incentives, working with the insurance industry, for example... DHS Secretary
Case 2:15-cv-03432-DDP-AGR Document 1 Filed 05/07/15 Page 1 of 15 Page ID #:1 UNITED STATES DISTRICT COURT FOR THE CENTRAL DISTRICT OF CALIFORNIA
Case :-cv-0-ddp-agr Document Filed 0/0/ Page of Page ID #: 0 Matthew T. Walsh, Esq. (Bar No. ) CARROLL, McNULTY & KULL LLC 00 North Riverside Plaza, Suite 00 Chicago, Illinois 00 Telephone: () 00-000 Facsimile:
DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT
Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security
Tools Conference Toronto November 26, 2014 Insurance for NFP s. Presented by Paul Spark HUB International HKMB Limited
Tools Conference Toronto November 26, 2014 Insurance for NFP s Presented by Paul Spark HUB International HKMB Limited Topics Insurance Policies Basics Directors and Officers Liability Insurance Commercial
Cyber Liability Insurance: It May Surprise You
Cyber Liability Insurance: It May Surprise You Moderator Eugene Montgomery, President & CEO Community Financial Insurance Center Panelists Antonio Trotta, Senior Claim Counsel, CNA Specialty William Heinbokel,
Insuring Innovation. CyberFirst Coverage for Technology Companies
Insuring Innovation. CyberFirst for Technology Companies TECHNOLOGY IS EVERYWHERE. SO ARE THE THREATS. protection that goes well beyond a traditional general liability policy. CyberFirst CyberFirst is
CYBER RISK SECURITY, NETWORK & PRIVACY
CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread
Cyber Threats: Exposures and Breach Costs
Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals
Privacy and Data Breach Protection Modular application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler
Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President [email protected] 2 What s at Risk? $300 billion in
Privacy Rights Clearing House
10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights
Discussion on Network Security & Privacy Liability Exposures and Insurance
Discussion on Network Security & Privacy Liability Exposures and Insurance Presented By: Kevin Violette Errors & Omissions Senior Broker, R.T. Specialty, LLC February, 25 2014 HFMA Washington-Alaska Chapter
Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
CYBER & PRIVACY LIABILITY INSURANCE GUIDE
CYBER & PRIVACY LIABILITY INSURANCE GUIDE 01110000 01110010 011010010111011001100001 01100 01110000 01110010 011010010111011001100001 0110 Author Gamelah Palagonia, Founder CIPM, CIPT, CIPP/US, CIPP/G,
Enterprise PrivaProtector 9.0
IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS
Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature
Demystifying Cyber Insurance Jamie Monck-Mason & Andrew Hill Introduction What is cyber? Nomenclature 1 What specific risks does cyber insurance cover? First party risks - losses arising from a data breach
Privacy / Network Security Liability Insurance Discussion. January 30, 2013. Kevin Violette RT ProExec
Privacy / Network Security Liability Insurance Discussion January 30, 2013 Kevin Violette RT ProExec 1 Irrefutable Laws of Information Security 1) Information wants to be free People want to talk, post,
IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411
IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING
ANATOMY of a DATA BREACH DISASTER. Avoiding a Cyber Catastrophe. June, 2011. Sponsored by:
ANATOMY of a DATA BREACH DISASTER Avoiding a Cyber Catastrophe June, 2011 Sponsored by: ANATOMY of a DATA BREACH DISASTER Avoiding a Cyber Catastrophe An Advisen Special Report Sponsored by Chartis Security
Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind
Page1 Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind The use of electronic medical records (EMRs) to maintain patient information is encouraged today and
RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION
RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former
Cyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd
Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations
How To Insure An Investment Advisor
SPOTLIGHT ON Insurance and Bonding Considerations for Registered Investment Advisors The contents of this Spotlight have been prepared for informational purposes only, and should not be construed as legal
EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND?
EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND? ABOUT JLT SPECIALTY JLT Specialty Insurance Services is the U.S. platform of JLT Group, the leading specialty business adivsory
Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace
Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace Testimony of Ben Beeson Vice President, Cyber Security and Privacy Lockton
Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF
Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF October 9, 2013 1 Cyber Insurance Why? United States Department of Commerce: Cyber Insurance
Cyber-Crime Protection
Cyber-Crime Protection A program of cyber-crime prevention, data breach remedies and data risk liability insurance for houses of worship, camps, schools, denominational/association offices and senior living
Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
Order Code RS20830 Updated February 25, 2008 Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Summary Charles Doyle Senior Specialist American Law Division The federal computer
Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor
Cyber Risks Management Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor 1 Contents Corporate Assets Data Breach Costs Time from Earliest Evidence of Compromise to Discovery of Compromise The Data Protection
WHITE PAPER BREACH, PRIVACY, AND CYBER COVERAGES: FACT AND FICTION CYBER COVERAGES
BREACH, PRIVACY, AND CYBER COVERAGES: FACT AND FICTION IDT911 1 DEFINITIONS 1. Cyber Programs - Focuses on services and systems related to technology and their use in business. Risks addressed include
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Investment in cyber insurance Lockton Companies
CYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America
CYBER INSURANCE Cyber Insurance and Gaps in Traditional Insurance Cyber and E&O Team Willis FINEX North America Privacy & Network Security (Cyber) Insurance COVERAGE MODULES Privacy Expense Consumer Notification
Navigating Cyber Risk Exposure and Insurance. Stephen Wares EMEA Cyber Risk Practice Leader Marsh
Navigating Cyber Risk Exposure and Insurance Stephen Wares EMEA Cyber Risk Practice Leader Marsh Presentation Format Four Key Questions How important is cyber risk and how should we view the cyber threat?
What Data? I m A Trucking Company!
What Data? I m A Trucking Company! Presented by: Marc C. Tucker 434 Fayetteville Street, Suite 2800 Raleigh, NC, 27601 919.755.8713 [email protected] Presented by: Rob D. Moseley, Jr. 2 West
Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance
Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance Today s agenda Introductions Cyber exposure overview Cyber insurance market and coverages Captive cyber insurance
How To Cover A Data Breach In The European Market
SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to
APIP - Cyber Liability Insurance Coverages, Limits, and FAQ
APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP
Law Firm Cyber Security & Compliance Risks
ALA WEBINAR Law Firm Cyber Security & Compliance Risks James Harrison CEO, INVISUS Breach Risks & Trends 27.5% increase in breaches in 2014 (ITRC) Over 500 million personal records lost or stolen in 2014
How To Write A Network Security Endorsement
THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. NETWORK SECURITY ENDORSEMENT INTEGRATED TECH CLAIMS MADE CLAIM EXPENSES INCLUDED WITHIN THE LIMITS OF INSURANCE This endorsement modifies
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in
Cyber Insurance Presentation
Cyber Insurance Presentation Presentation Outline Introduction General overview of Insurance About us Cyber loss statistics Cyber Insurance product coverage Loss examples Q & A About Us A- Rated reinsurance
CyberSecurity for Law Firms
CyberSecurity for Law Firms Cracking the Cyber Code: Recent Headlines, Reinforcing the Need and Response Planning July 16, 2013 Making the Case Matthew Magner Senior Underwriting Officer Chubb & Son, a
Cybersecurity y Managing g the Risks
Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking
CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:
Company or Trading Name: Address: Post Code: Telephone: E-mail: Website: Date Business Established Number of Employees Do you have a Chief Privacy Officer (or Chief Information Officer) who is assigned
Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked
Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Linda Vincent, R.N., P.I., CITRMS Vincent & Associates Founder The Identity Advocate San Pedro, California The opinions expressed
Understanding the Business Risk
AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 [email protected] Disclaimer The views expressed
In an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
Cybersecurity Workshop
Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153
Managing Cyber & Privacy Risks
Managing Cyber & Privacy Risks NAATP Conference 2013 NSM Insurance Group Sean Conaboy Rich Willetts SEAN CONABOY INSURANCE BROKER NSM INSURANCE GROUP o Sean has been with NSM Insurance Group for the past
Cyber Risks in Italian market
Cyber Risks in Italian market Milano, 01.10.2014 Forum Ri&Assicurativo Gianmarco Capannini Agenda 1 Cyber Risk - USA 2 Cyber Risk Europe experience trends Market size and trends Market size and trends
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET
DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET 2014 NSGA Management Conference John Webb Jr., CIC Emery & Webb, Inc. Inga Goddijn, CIPP/US Risk Based Security, Inc. Not just a big business problem
GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE
GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of
2005 -- H 6191 SUBSTITUTE A AS AMENDED ======= LC02663/SUB A/2 ======= STATE OF RHODE ISLAND IN GENERAL ASSEMBLY JANUARY SESSION, A.D.
00 -- H 11 SUBSTITUTE A AS AMENDED LC0/SUB A/ STATE OF RHODE ISLAND IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 00 A N A C T RELATING TO IDENTITY THEFT PROTECTION Introduced By: Representatives Gemma, Sullivan,
Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL
Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL Using Insurance Coverage to Mitigate Cybersecurity Risks To Warranty and Service Contract Businesses Barry Buchman, Partner
Comprehensive Liability
Comprehensive Liability Insurance Policies This Liability Cover package applies to Cycling New Zealand, Mountain Bike New Zealand, BMX New Zealand, New Zealand Schools Cycling Association and all other
Zurich Security And Privacy Protection Policy Application
Zurich Security And Privacy Protection Policy Application COVERAGE A. AND COVERAGE F. OF THE POLICY FOR WHICH YOU ARE APPLYING IS WRITTEN ON A CLAIMS FIRST MADE AND REPORTED BASIS. ONLY CLAIMS FIRST MADE
HOW TO DETERMINE WHETHER YOUR COMMERCIAL GENERAL LIABILITY ( CGL ) INSURANCE CARRIER IS OBLIGATED TO COVER A CLAIM MADE AGAINST YOUR COMPANY
HOW TO DETERMINE WHETHER YOUR COMMERCIAL GENERAL LIABILITY ( CGL ) INSURANCE CARRIER IS OBLIGATED TO COVER A CLAIM MADE AGAINST YOUR COMPANY Every company has a person in charge of its insurance. If your
