Cyber Security: The Growing Liability of Handheld & Mobile Devices
|
|
- Malcolm Ambrose Holland
- 8 years ago
- Views:
Transcription
1 Cyber Security: The Growing Liability of Handheld & Mobile Devices 1
2 About Advisen: Advisen Ltd. is a privately-owned, independent and unbiased provider of news, data and risk analytics to the commercial insurance industry. Advisen s mission is to deliver productivity and insight to insurance professionals. Advisen brings greater success though technology and data, revolutionizing the way the commercial insurance industry functions. Our customers leverage the Advisen platform, adding power to their proprietary ability and bringing value to their clients. Please locate us on: 2
3 Many Thanks to our Sponsor!
4 Cyber Security: The Growing Liability of Handheld & Mobile Devices White Paper: The Liability of Handheld & Mobile Devices Copy of these slides Recording of today s webinar 4
5 Today s Moderator David Bradford- President, Research & Editorial Group, Advisen Ltd.
6 Today s Panelists Catherine Mulligan, Senior Vice President, Zurich NA Larry Collins, Vice President, E-Solutions Risk John Mullen, Parter, Nelson Levine de Luca & Hamilton
7 Today s Panelists Catherine Mulligan, Senior Vice President, Zurich NA Catherine has specialized in the risk management and risk transfer issues around technology, Errors & Omissions, Intellectual Property, and Security & Privacy for 15 years as both an underwriter and a broker. Catherine is a Senior Vice President of Zurich North America, where she is the national underwriting manager for Specialty E&O. The group handles Errors & Omissions, Security & Privacy, and Employed Lawyers. Prior to Zurich, Catherine was an AVP at The Chubb Group of Insurance companies where she was a regional underwriting manager in the technology division, earning her Underwriting Specialist designation with a focus on E&O. She later spent 3 years as a broker at William Gallagher Associates in New York City, where she worked with technology and life sciences companies. Catherine is a frequent speaker at events relating to Security & Privacy and Technology E&O issues. She contributes to articles and interviews for industry publications. She graduated cum laude from The College of the Holy Cross in Worcester, MA with a double major in English and Women's Studies.
8 Today s Panelists Larry Collins, Vice President, E-Solutions Risk Larry has more than 35 years of experience in Risk Engineering.. As the Vice President for E- Solutions, he leads a team that provides electronic services to tens of thousands of on-line customers. He s appeared on TV on cyber security, has spoken on a number of panels and has published several articles and white papers on Security and Privacy related risk issues. He s done many media interviews on that subject. Larry s team recently received the Arthur Quern Quality Awards from the Risk and Insurance Managers Society (RIMS) for their Accident Review Tool. The Arthur Quern Quality Award recognizes significant contributions within the field of risk management that raises the quality of products, processes, programs, systems and services. The recipient of the Arthur Quern Quality Award demonstrates innovation within the risk management industry and increased quality in products, services and enterprise risk management within an organization.
9 Today s Panelists John Mullen, Parter, Nelson Levine de Luca & Hamilton John Mullen leads the Privacy and Data Security Practice at Nelson Levine de Luca & Hamilton. John focuses his practice on the defense of information security and privacy matters, with particular emphasis on response to data loss events and suits. He serves as legal Breach Counsel, advising clients on issues related to IT forensics, customer and government notification and compliance, public relations, customer remedies, litigation hold/e-discovery requirements, and class action/multi-district litigation (MDL) issues. John frequently presents to insurers, insureds, risk managers and brokers, and has authored articles on the subject that have appeared in various publications including Best s Review and Business Insurance.
10 What is driving the rapid growth in the use of handheld devices for business purposes? What are some of the common business uses for these devices? Dave Bradford- Advisen Ltd. Catherine Mulligan, Senior Vice President, Zurich NA Larry Collins, Vice President, E-Solutions Risk John Mullen, Parter, Nelson Levine de Luca & Hamilton
11 Is losing a device the most significant data security threat? Dave Bradford- Advisen Ltd. Catherine Mulligan, Senior Vice President, Zurich NA Larry Collins, Vice President, E-Solutions Risk John Mullen, Parter, Nelson Levine de Luca & Hamilton
12 Are these devices more vulnerable to data breaches than other types of computing and communication devices? Dave Bradford- Advisen Ltd. Catherine Mulligan, Senior Vice President, Zurich NA Larry Collins, Vice President, E-Solutions Risk John Mullen, Parter, Nelson Levine de Luca & Hamilton
13 Can you explain what near field communication technology is, and the risks it presents? Dave Bradford- Advisen Ltd. Catherine Mulligan, Senior Vice President, Zurich NA Larry Collins, Vice President, E-Solutions Risk John Mullen, Parter, Nelson Levine de Luca & Hamilton
14 How vulnerable are these devices vulnerable to malware? Dave Bradford- Advisen Ltd. Catherine Mulligan, Senior Vice President, Zurich NA Larry Collins, Vice President, E-Solutions Risk John Mullen, Parter, Nelson Levine de Luca & Hamilton
15 Do employees commonly use their personal devices for business purposes? Does this lead to increased vulnerabilities? Dave Bradford- Advisen Ltd. Catherine Mulligan, Senior Vice President, Zurich NA Larry Collins, Vice President, E-Solutions Risk John Mullen, Parter, Nelson Levine de Luca & Hamilton
16 Do government regulators and organizations such as PCI regulate data security and breach events that exist with the new mobility of data? Dave Bradford- Advisen Ltd. Catherine Mulligan, Senior Vice President, Zurich NA Larry Collins, Vice President, E-Solutions Risk John Mullen, Parter, Nelson Levine de Luca & Hamilton
17 Given the risks posed by these devises, why do companies permit their use? Dave Bradford- Advisen Ltd. Catherine Mulligan, Senior Vice President, Zurich NA Larry Collins, Vice President, E-Solutions Risk John Mullen, Parter, Nelson Levine de Luca & Hamilton
18 What has been the response of corporate IT departments and others responsible for data security? Dave Bradford- Advisen Ltd. Catherine Mulligan, Senior Vice President, Zurich NA Larry Collins, Vice President, E-Solutions Risk John Mullen, Parter, Nelson Levine de Luca & Hamilton
19 What risk management actions can improve the security of handheld devices? Dave Bradford- Advisen Ltd. Catherine Mulligan, Senior Vice President, Zurich NA Larry Collins, Vice President, E-Solutions Risk John Mullen, Parter, Nelson Levine de Luca & Hamilton
20 What should be the focus of a company s mobile device policy? Dave Bradford- Advisen Ltd. Catherine Mulligan, Senior Vice President, Zurich NA Larry Collins, Vice President, E-Solutions Risk John Mullen, Parter, Nelson Levine de Luca & Hamilton
21 What should be done if a handheld devise housing or accessing sensitive information is lost? Dave Bradford- Advisen Ltd. Catherine Mulligan, Senior Vice President, Zurich NA Larry Collins, Vice President, E-Solutions Risk John Mullen, Parter, Nelson Levine de Luca & Hamilton
22 What insurance coverages are available for mobile device data breaches? Dave Bradford- Advisen Ltd. Catherine Mulligan, Senior Vice President, Zurich NA Larry Collins, Vice President, E-Solutions Risk John Mullen, Parter, Nelson Levine de Luca & Hamilton
23 Q&A
24 White Paper: Available on Advisen s Corner Store 24
25 Upcoming Advisen Webinars Visit for the 2012 Webinar Schedule The Reputational Risk of a Data Breach Tuesday, September 25, 2012 at 11am EDT Business Interruption-Business Income & Supply Chain Risks Wednesday, September 26, 2012 at 11am EDT 25
26 Upcoming Advisen Conferences Visit for the 2012 Webinar Schedule Management Liability Insights Conference Date: Thursday Septmeber 20, 8:00 AM EDT Location: McGraw Hill Conference Center, NYC Cyber Liability Insights Conference Date: Wednesday October 24, 8:00 AM EDT Location: Bridgewaters, NYC 26
27 How to reach us: Advisen Ltd Broadway 8 th Floor New York, NY Voice: Fax: support@advisen.com 27
Hospital Property Risk Management and Insurance in a Changing World
Hospital Property Risk Management and Insurance in a Changing World 1 About Advisen: Advisen Ltd. is a privately-owned, independent and unbiased provider of news, data and risk analytics to the commercial
More informationSponsored By: Privacy Issues of Big Data 6.27.2013
Sponsored By: Privacy Issues of Big Data 6.27.2013 1 About Advisen is a privately-owned, independent and unbiased provider of news, data and risk analytics to the commercial insurance industry. Advisen
More informationCloud Computing: Making it Work for Your Business. Sponsored By:
Cloud Computing: Making it Work for Your Business Sponsored By: 1 About Advisen Advisen generates, integrates, analyses and communicates unbiased, real-time insights for the global community of commercial
More informationCyber Sanity: Innovative Approaches to Data Security. Sponsored By:
Cyber Sanity: Innovative Approaches to Data Security Sponsored By: 1 About Advisen Advisen generates, integrates, analyses and communicates unbiased, real-time insights for the global community of commercial
More informationTraumatic Brain Injury Liability: What Education Institutions Need to Know. Sponsored By:
Traumatic Brain Injury Liability: What Education Institutions Need to Know Sponsored By: 1 About Advisen Advisen generates, integrates, analyses and communicates unbiased, real-time insights for the global
More informationPractical Takeaways for a Healthy European Cyber Market. Sponsored By:
Practical Takeaways for a Healthy European Cyber Market Sponsored By: 1 Practical Takeaways for a Healthy European Cyber Market www.cyberrisknetwork.com www.advisenltd.com Recording of today s webinar
More informationThe Power of Predictive Models in Workers Compensation Claims Handling. Sponsored by:
The Power of Predictive Models in Workers Compensation Claims Handling Sponsored by: The Power of Predictive Models in Workers Compensation Claims Handling Visit www.advisenltd.com at the end of this webinar
More information2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: A SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN THE ASIA-PACIFIC REGION
2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: A SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN THE ASIA-PACIFIC REGION April 2014 Sponsored by: 2014 Network Security & Cyber Risk Management:
More information2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE
2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2014 Sponsored by: 2014 Network Security & Cyber Risk Management:
More informationGALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
More informationAbout the Survey Respondents
SPECIAL REPORT Information Security & Cyber Liability Risk Management The Second Annual Survey of Enterprise-wide Cyber Risk Management Practices in Europe February 2013 SPECIAL REPORT Information Security
More informationGALLAGHER CYBER LIABILITY PRACTICE. Cyber Risk Exposures and Solutions
GALLAGHER CYBER LIABILITY PRACTICE Cyber Risk Exposures and Solutions Cyber Risk Exposures and Solutions Arthur J. Gallagher & Co. s Cyber Liability Practice has the expertise and the desire to deliver
More informationINFORMATION SECURITY CYBER LIABILITY RISK MANAGEMENT. October 2013. Sponsored by:
2013 INFORMATION SECURITY CYBER LIABILITY RISK MANAGEMENT & October 2013 & INFORMATION SECURITY CYBER LIABILITY RISK MANAGEMENT: The Third Annual Survey on the Current State of and Trends in Information
More informationHow to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised
ACE USA Podcast Released June 24, 2010 How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised Moderator: Richard Tallo Senior Vice President, ACE North America Marketing
More informationCYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading
CYBER LIABILITY RISKS SEMINAR Programme overview THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading JLT Specialty (JLT) would like to invite you to a highly informative technical
More informationInsurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
More informationManaging Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal
Managing Cyber Threats Risk Management & Insurance Solutions Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal Overview Recent Trends and Loss Exposures Risk Management Strategies
More information2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE
2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2015 2015 Network Security & Cyber Risk Management: The FOURTH
More informationPreparing for the Inevitable Data Breach: What to Do Before Sensitive Customer and Employee Data is Breached, Stolen or Compromised
ACE USA Podcast Released February 3, 2010 Preparing for the Inevitable Data Breach: What to Do Before Sensitive Customer and Employee Data is Breached, Stolen or Compromised Moderator: Richard Tallo Senior
More informationRogers Insurance Client Presentation
Rogers Insurance Client Presentation Network Security and Privacy Breach Insurance Presented by Matthew Davies Director Professional, Media & Cyber Liability Chubb Insurance Company of Canada mdavies@chubb.com
More informationLaw Firm Cyber Risk Conference: Addressing the Issues from the Top Down
Program Organizer: Please join us for a NEW Invitation Only Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down Role of Firm Leadership, IT, COO, General Counsel Data Breaches Identification
More informationHit ratios are still very low for Security & Privacy coverage: What are companies waiting for?
Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for? Authored by Neeraj Sahni and Tim Stapleton Neeraj Sahni is Director, Insurance Channel at Kroll Cyber Investigations
More informationSOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT)
INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015
More informationANATOMY of a DATA BREACH DISASTER. Avoiding a Cyber Catastrophe. June, 2011. Sponsored by:
ANATOMY of a DATA BREACH DISASTER Avoiding a Cyber Catastrophe June, 2011 Sponsored by: ANATOMY of a DATA BREACH DISASTER Avoiding a Cyber Catastrophe An Advisen Special Report Sponsored by Chartis Security
More informationBE ON GUARD. Understanding the Executive Liability Risks That Can Threaten Your Biotechnology Company
Presented by BIO, Monitor Liability Managers, LLC and William Gallagher Associates BE ON GUARD Understanding the Executive Liability Risks That Can Threaten Your Biotechnology Company Serge Adam, AVP Claims
More informationerisks Policyholder s Guide to Privacy & Security Breach Response Planning
erisks Policyholder s Guide to Privacy & Security Breach Response Planning Professional Indemnity Financial Institutions Directors & Officers Management Liability Medical Malpractice Media Liability Level
More informationCyber Insurance Presentation
Cyber Insurance Presentation Presentation Outline Introduction General overview of Insurance About us Cyber loss statistics Cyber Insurance product coverage Loss examples Q & A About Us A- Rated reinsurance
More informationGRC/Cyber Insurance. February 18, 2014. Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London. Join the conversation: #ISSAWebConf
GRC/Cyber Insurance February 18, 2014 Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London Join the conversation: 1 Generously sponsored by: 2 Welcome Conference Moderator Allan Wall ISSA Web Conference
More informationUnderstanding the Cyber Risk Insurance and Remediation Services Marketplace:
Understanding the Cyber Risk Insurance and Remediation Services Marketplace: A Report on the Experiences and Opinions of Middle Market CFOs September 2010 Betterley Risk Research Insight for the Insurance
More informationCYBER & PRIVACY LIABILITY INSURANCE GUIDE
CYBER & PRIVACY LIABILITY INSURANCE GUIDE 01110000 01110010 011010010111011001100001 01100 01110000 01110010 011010010111011001100001 0110 Author Gamelah Palagonia, Founder CIPM, CIPT, CIPP/US, CIPP/G,
More informationCYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY. October 2014. Sponsored by:
CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY October 2014 CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY Global reinsurer PartnerRe collaborated with Advisen to conduct a comprehensive market survey
More informationWILLIAM GALLAGHER ASSOCIATES
WILLIAM GALLAGHER ASSOCIATES It's Not Just the Insurance Clause Unintended Consequences of Onerous Contract Terms April 5, 2006 TODAY S S PANEL Moderator: Edward J. Flanagan, CPCU William Gallagher Associates
More informationSenate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace
Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace Testimony of Ben Beeson Vice President, Cyber Security and Privacy Lockton
More informationNew ADA Return to Work Interpretations covered in the 2015 Ultimate Guide to Mastering Workers Comp Costs. March 24, 2015
New ADA Return to Work Interpretations covered in the 2015 Ultimate Guide to Mastering Workers Comp Costs March 24, 2015 1 New ADA Return to Work Interpretations www.advisenltd.com Recording of today s
More informationReducing Risk. Raising Expectations. CyberRisk and Professional Liability
Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Are you exposed to CyberRisk? Like nearly every other business, you have likely capitalized on the advancements in technology today
More informationSolutions for Your Unique Healthcare Risk Management Challenges
Solutions for Your Unique Healthcare Risk Management Challenges Rising to Meet your Healthcare Challenges Beecher Carlson s National Healthcare Practice is acutely aware of what is ailing healthcare providers.
More informationCyber Security: Compliance and Protection 2012 A Complimentary LexisNexis Webinar December 11, 2012
Cyber Security: Compliance and Protection 2012 A Complimentary LexisNexis Webinar December 11, 2012 David Chatfield, Vice President, Cyber Security Services, NetDiligence Linda Clark, Esq., U.S. Senior
More informationCyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor
Cyber Risks Management Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor 1 Contents Corporate Assets Data Breach Costs Time from Earliest Evidence of Compromise to Discovery of Compromise The Data Protection
More informationCommon Mistakes Made With Real Estate Errors and Omissions Insurance. Gallagher Real Estate & Hospitality
Common Mistakes Made With Real Estate Errors and Omissions Insurance Gallagher Real Estate & Hospitality MARCH 2015 Common Mistakes Made With Real Estate Errors and Omissions Insurance Complex real estate
More informationCyber Risk and Insurance What companies need to know
Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the
More informationTODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures
TODAY S AGENDA Trends/Victimology Incident Response Remediation Disclosures Trends/Victimology ADVERSARY CLASSIFICATIONS SOCIAL ENGINEERING DATA SOURCES COVERT INDICATORS - METADATA METADATA data providing
More informationData security: A growing liability threat
Data security: A growing liability threat Data security breaches occur with alarming frequency in today s technology-laden world. Even a comparatively moderate breach can cost a company millions of dollars
More informationDistributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015
Distributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015 Today s Agenda What are we talking about today? What is Risk Evolution of risk management Understand the importance of Risk
More informationOctober 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
More informationIs Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution
Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: March 2013 Ponemon Institute Research Report
More informationFacility and Support Services
Facility and Support Services 600 West 4 th Street Davenport, Iowa 52801-1003 fss @ scottcountyiowa.com (563) 326-8738 Voice (563) 328-3245 Fax Item 10 06-2-15 May 28, 2015 To: Dee F. Bruemmer County Administrator
More informationIs Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution
Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: April 2013 Ponemon Institute Research Report
More informationLaw Firm Cyber Security & Compliance Risks
ALA WEBINAR Law Firm Cyber Security & Compliance Risks James Harrison CEO, INVISUS Breach Risks & Trends 27.5% increase in breaches in 2014 (ITRC) Over 500 million personal records lost or stolen in 2014
More informationLETTER TO BROKERS. Today we are launching Reputation Risk Solutions Limited:
LETTER TO BROKERS Today we are launching Reputation Risk Solutions Limited: We are a new and unique independent specialist Reputation Risk Insurance Intermediary. We believe Reputation Risk Insurance is
More informationAnatomy of a Privacy and Data Breach
Anatomy of a Privacy and Data Breach Understanding the Risk and Managing a Crisis Adam Kardash: Partner, Heenan Blaikie LLP Robert Parisi: Senior Vice President, Marsh Leadership, Knowledge, Solutions
More informationCyberSecurity for Law Firms
CyberSecurity for Law Firms Cracking the Cyber Code: Recent Headlines, Reinforcing the Need and Response Planning July 16, 2013 Making the Case Matthew Magner Senior Underwriting Officer Chubb & Son, a
More informationProfessional Indemnity
Allianz Global Corporate & Specialty Professional Indemnity Capability Statement Protecting your clients with a range of professional indemnity products. Professional Indemnity at a glance In an increasingly
More informationOpening Remarks. David Bradford President, Research & Editorial Division Advisen
Welcome! Opening Remarks David Bradford President, Research & Editorial Division Advisen Thank you to our sponsors Keynote Address Summer Fowler Deputy Technical Director of the CERT Cyber Security Solutions
More informationCyber Liability. AlaHA Annual Meeting 2013
Cyber Liability AlaHA Annual Meeting 2013 Disclaimer We are not providing legal advise. This Presentation is a broad overview of health care cyber loss exposures, the process in the event of loss and coverages
More informationLowering Workers Comp Costs Best Practices. October 9, 2014
Lowering Workers Comp Costs Best Practices October 9, 2014 1 Your Ultimate Guide to Mastering Workers Comp Costs Learn more about Mastering Workers Comp Costs: www.advisenltd.com/wcbooks Price: $249 2
More informationCGI Cyber Risk Advisory and Management Services for Insurers
CGI Cyber Risk Advisory and Management Services for Insurers Minimizing Cyber Risks cgi.com 3 As organizations seek to create value in today s highly interconnected world, they inherently increase their
More informationZurich Public Sector Solution
Zurich Public Sector Solution Solutions for an Evolving Public Sector Managing risk for a Public Sector entity has taken on an unprecedented level of complexity. Consider for a moment the evolving risks
More informationBoard Approved June 9, 2014
Board Approved June 9, 2014 Our casualty insurance package policy includes coverage for General Liability, Educators Legal, Employment Practices, Automobile Liability, Auto Physical Damage and Workers
More informationPANEL DISCUSSION: Cyber Risk Insurance. 19 March 2015. (Network Security & Privacy Insurance)
PANEL DISCUSSION: Cyber Risk Insurance (Network Security & Privacy Insurance) 19 March 2015 Panelists: Cinzia Altomare, Manager Facultative, Gen Re, Italy Michael Shen, AVP, Liberty Specialty Markets,
More informationIntroduction to Medical Malpractice Insurance
William Gallagher Associates Introduction to Medical Malpractice Insurance What is Medical Malpractice Insurance? Insurance, in general, is the practice of sharing your risk with a large number of individuals
More informationBeazley Group Beazley Breach Response. A data breach isn t always a disaster Mishandling it is.
Beazley Group Beazley Breach Response A data breach isn t always a disaster Mishandling it is. A world of risk 932.7m Personal records breached in the U.S. since 2005 3 51% The proportion of breaches attributable
More informationCYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become
More informationDavid A. Bertschi Partner
Call to the Bar: Ontario 1985 Languages: English French Education LL.B., University of Windsor, Windsor, Ontario (1983) B.A., Carleton University, Ottawa, Ontario (1980) Areas of Practice Insurance litigation
More informationIDENTIFYING AND RESPONDING TO DATA BREACHES
IDENTIFYING AND RESPONDING TO DATA BREACHES Michael P. Hindelang Honigman Miller Schwartz and Cohn LLP October 14, 2015 Merit Security Summit DATA SECURITY RISKS, THREATS & REAL WORLD EXAMPLES OVERVIEW
More informationCyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
More informationIDC Member Insurance Program brought to you by LMS PROLINK Ltd.
IDC Member Insurance Program brought to you by LMS PROLINK Ltd. Protecting You and Your Clients LMS PROLINK Ltd. Tel 416.644.7717 480 University Avenue, Toll Free 800.663.6828 Suite 800 Toronto ON Fax
More informationLeveraging SANS and NIST to Evaluate New Security Tools
Leveraging SANS and NIST to Evaluate New Security Tools Agenda About TaaSera A Problem to Solve Overview of NIST Cybersecurity Framework Overview of SANS CSC-20 Call to Action Conclusion Q&A Company Founded
More informationSUSTAINING THE PROFESSIONAL: PROTECTING YOUR ASSETS
SUSTAINING THE PROFESSIONAL: PROTECTING YOUR ASSETS AUGUST 2, 2013 Denise K. Gibson, RPLU Vice President Graham M. Fuller Senior Vice President Urbandale, Iowa Marsh US Consumer, a service of Seabury &
More informationAllianz Global Corporate & Specialty. Cyber Risks. Recent Trends. AIRMIC 15 th June 2015
Allianz Global Corporate & Specialty Cyber Risks Recent Trends AIRMIC 15 th June 2015 Copyright Allianz Global Corporate & Specialty 2014 1 Copyright Allianz Global Corporate & Specialty 2014 2 Allianz
More informationJOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile
JOINT EVENT WITH IIBA-LA Trends & Best Practices in Cybersecurity for networks, cloud computing and mobile April 23 rd, 2015 Hands-on Experts Share Current Strategies to Manage Cybersecurity Today s enterprise
More informationHow To Transform Insurance Through Digital Transformation
Digital transformation can help you tame the perfect storm. The digital future for insurance. Following the 2008 financial crisis, the insurance sector has faced tighter regulation, which has made it harder
More informationCyber Risk and the Utility Industry
Cyber Risk and the Utility Industry Imran Ahmad Lawyer, Cassels Brock & Blackwell LLP Canadian Legal Landscape Personal Information Protection and Electronic Documents Act (PIPEDA) Federal legislation
More informationTHE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Investment in cyber insurance Lockton Companies
More information8 2014/2015 INSURANCE COVERAGE RENEWAL
Clause No. 8 in Report No. 12 of the was adopted, without amendment, by the Council of The Regional Municipality of York at its meeting held on June 26, 2014. 8 2014/2015 INSURANCE COVERAGE RENEWAL recommends
More informationPrivacy Insurance. Avoiding the HMO Experience. cyber. More Differences. By Toby Merrill
Privacy Insurance Avoiding the HMO Experience By Toby Merrill Privacy, as it relates to an individual s personally identifiable information, such as Social Security numbers, credit card and healthcare
More informationRISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION
RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former
More informationINTegrity by Chubb SM. Errors & Omissions Liability Insurance for Information and Network Technology Companies
INTegrity by Chubb SM Errors & Omissions Liability Insurance for Information and Network Technology Companies Will your company be the next target of an E&O lawsuit? The stakes in technology errors and
More informationDiscussion on Network Security & Privacy Liability Exposures and Insurance
Discussion on Network Security & Privacy Liability Exposures and Insurance Presented By: Kevin Violette Errors & Omissions Senior Broker, R.T. Specialty, LLC February, 25 2014 HFMA Washington-Alaska Chapter
More informationDEEPWATER HORIZON BACKGROUND
TODAY! - DEEPWATER HORIZON OIL WEBINAR at 11am EDT Exactly how extensive are the insurance ramifications of the Deepwater Horizon oil rig disaster and spill in the Gulf of Mexico now considered to be the
More informationCyber-insurance: Understanding Your Risks
Cyber-insurance: Understanding Your Risks Cyber-insurance represents a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some
More informationCyber Liability Insurance:
Cyber Liability Insurance: Reg Harnish, CISSP, CISM, CISA Chief Security Strategist GreyCastle Security Steve Lobel Vice President Anchor Agency October 17, 2013 1,200 Introduction Cybercrime Today Major
More informationLIFE INSURANCE AS AN ALTERNATIVE TO TRADITIONAL DEFERRED COMPENSATION DESIGNS?
LIFE INSURANCE AS AN ALTERNATIVE TO TRADITIONAL DEFERRED COMPENSATION DESIGNS? Seven Key Questions to Ask When Reviewing Life Insurance Proposals 2012, SULLIVAN, COTTER AND ASSOCIATES, INC. Every once
More informationCyber Risks Connect With Directors and Officers
Cyber Risks Connect With Directors and Officers Implications of the New SEC Guidance on Cyber Security February 2012 Lockton Companies, LLC The Securities and Exchange Commission (SEC) has changed the
More informationINSURING OWNERS DESIGN ERRORS AND OMISSIONS EXPOSURES
Workshop W9 Wednesday, November 12 1:30 2:45 p.m. and 3:05 4:20 p.m. INSURING OWNERS DESIGN ERRORS AND OMISSIONS EXPOSURES Presented by Workshop W9 Jeff Slivka Chief Operating Officer/Executive Vice President
More informationPayment Card Industry Update and Cyber Risk Management
Payment Card Industry Update and Cyber Risk Management CRAIG A. HOFFMAN, ESQ. BAKERHOSTETLER ADAM COTTINI, MANAGING DIRECTOR, CYBER LIABILITY PRACTICE, ARTHUR J GALLAGHER & CO. OCTOBER 22, 2015 2014 ARTHUR
More informationMichael Gaudet 2015 PHC 7/23/2015. Key Broker Challenges
Cyber 2015: The Market, Choosing Coverages and AEGIS Update Broker s Perspective Michael Gaudet Marsh FINPRO Energy, Power & Utility Industry Leader Marsh USA, Inc. Key Broker Challenges Coverage consistency
More informationIncrease insight. Reduce risk. Feel confident.
Increase insight. Reduce risk. Feel confident. Define critical goals with enhanced visibility then enable security and compliance across your complex IT infrastructure. VIRTUALIZATION + CLOUD NETWORKING
More informationManaged Security Services. Leverage our experienced security operations team to improve your cyber security posture
Managed Security Services Leverage our experienced security operations team to improve your cyber security posture Our approach to Managed Security Services Enterprises spend millions on technology to
More informationOrganizations today are faced with an CORPORATE COUNSEL PROVIDE AN INSIDE LOOK AT THE STATE OF E-DISCOVERY EXECUTIVE REPORT
2014 www.bdo.com EXECUTIVE REPORT CORPORATE COUNSEL PROVIDE AN INSIDE LOOK AT THE STATE OF E-DISCOVERY Survey Finds E-Discovery Effectiveness Requires Significant Improvement, While Scope and Total Cost
More informationCybersecurity y Managing g the Risks
Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking
More informationSEC Cybersecurity Findings May Establish De Facto Standard
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com SEC Cybersecurity Findings May Establish De Facto
More informationCyber Security. Moderator: Marla J. Kreindler, Partner, Morgan, Lewis & Bockius LLP
Cyber Security Moderator: Marla J. Kreindler, Partner, Morgan, Lewis & Bockius LLP Speakers: Keith Overly, Executive Director, Ohio Deferred Compensation Program Raj Patel, Partner, Plante & Moran, PLLC
More informationDATA BREACH RESPONSE READINESS Is Your Organization Prepared?
March 30, 2015 DATA BREACH RESPONSE READINESS Is Your Organization Prepared? Peter Sloan Pete Enko Jeff Jensen Deborah Juhnke The data security imperatives of Prevention, Detection, and Response do not
More informationSpecialty Risk Protector
Specialty Professional Liability and Data and Network Security Insurance is a single policy that makes it easy for companies to secure the multi-faceted E&O protection our networked world requires. A simplified,
More informationAftermath of a Data Breach Study
Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath
More informationDATA BREACH: hy you should care!
DATA BREACH: hy you should care! Bob Gregg CEO Bob.gregg@idexpertscorp.com 1 Overview Defining the cyber security and Data breach problem The threat source- surprising Potential business impact No one
More informationWFG Title Agents Insurance Program wfgagents.usi.biz
WFG Title Agents Insurance Program wfgagents.usi.biz About The Program Partnership between USI and WFG American Land Title Association Compliance Best Practices of the ALTA Best Practice No. 3: Adopt and
More informationTen Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
More informationcyber invasions cyber risk insurance AFP Exchange
Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance
More informationHow To Buy Cyber Insurance
10-26-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
More information