Rogers Insurance Client Presentation



Similar documents
Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Understanding the Business Risk

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Mitigating and managing cyber risk: ten issues to consider

ISO? ISO? ISO? LTD ISO?

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

NZI LIABILITY CYBER. Are you protected?

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

CYBER RISK SECURITY, NETWORK & PRIVACY

Privacy / Network Security Liability Insurance Discussion. January 30, Kevin Violette RT ProExec

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

CyberSecurity for Law Firms

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Think STRENGTH. Think Chubb. Cyber Insurance. Andrew Taylor. Asia Pacific Zone Product Manager Chubb Pro PI, Media, Cyber

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

Cyber and data Policy wording

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Zurich Public Sector Solution

Cyber/ Network Security. FINEX Global

DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET

Embracing Cyber Risk: Insurance Solutions

Cyber Liability Insurance: It May Surprise You

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Joe A. Ramirez Catherine Crane

Managing Cyber Risk through Insurance

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

October 24, Mitigating Legal and Business Risks of Cyber Breaches

Enterprise PrivaProtector 9.0

Cyber Insurance Presentation

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

CYBER-LIABILITY COVERAGE: The $ 45 Million Dollar Exposure

2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage

Cyber Risks and Insurance Solutions Malaysia, November 2013

Making Sense of Cyber Insurance: A Guide for SMEs

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA Toll Free: (877) IRON411

Discussion on Network Security & Privacy Liability Exposures and Insurance

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Cyber Liability. What School Districts Need to Know

How To Protect Your Data From Hackers

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance

Data Privacy & Security: Essential Questions Every Business Must Ask

Cyber Insurance as one element of the Cyber risk management strategy

DATA BREACH COVERAGE

Privacy Rights Clearing House

An Introduction to Cyber Liability Insurance. Catherine Berry Senior Underwriter

Network Security & Privacy Landscape

Cyber Risks in the Boardroom

Managing Cyber & Privacy Risks

Cybersecurity y Managing g the Risks

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

National Corporate Practice. Cyber risks explained what they are, what they could cost and how to protect against them

Tools Conference Toronto November 26, 2014 Insurance for NFP s. Presented by Paul Spark HUB International HKMB Limited

Data Breach and Senior Living Communities May 29, 2015

Retail Roundtable: Payment System Cyber Attacks Preparing, Protecting, and Responding. June 11, 2014

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

cyber invasions cyber risk insurance AFP Exchange

Insurance implications for Cyber Threats

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Data Privacy, Security, and Risk Management in the Cloud

CYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America

Specialty Risk Protector

Cyber Risk Insurance for Agents. Frequently Asked Questions

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

External Supplier Control Requirements BCM

Public Private Partnerships and National Input to International Cyber Security

Privacy and Data Breach Protection Modular application form

Transcription:

Rogers Insurance Client Presentation Network Security and Privacy Breach Insurance Presented by Matthew Davies Director Professional, Media & Cyber Liability Chubb Insurance Company of Canada mdavies@chubb.com October 2014 1

Emerging Exposures Systems Evolutions Social Media and Big Data Cloud Computing Bring Your Own Device Hyper targeting Mobile Payment Solutions Regulatory Activism Privacy Commissioner of Canada and Provincial Counterparts Other Regulators (ex. OSFI) US States Attorneys General 2

(1) PwC Managing cyber risks in an interconnected world - www.pwc.com/gsiss2015 Detection of Security Incidents (1) 1,151

(2) Ponemon Institute Research Report: Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age CHUBB SPECIALTY INSURANCE Security exploits in the last 24 months (2) 4

Communicating the Issues (3) (3) Gandalf Group 31 st Quarterly C-Suite Survey 18 June 2013 (2) Gandalf Group 31 st Quarterly C-Suite Survey 18 June 2013 33% 63% 64% C-Suite Executives expect that their organization will be subjected to a Cyber Attack Senior Management expect such Cyber Attack in the next 6 months Senior Management have not communicated their concerns to the C- Suite level executives 5

No matter how good your IT department is Who s your Dave? 6

The Perfect Risk An Underwriter s Wish List Q: What makes your organization a good risk to insure? A: You are able to manage and survive an event in the absence of insurance. If you had a privacy or cyber breach, would you be just a bit shaken, badly maimed or outright killed in action? Incident response plan (IRP) Disaster recovery plan (DRP) Business continuity plan (BCP) Responsive and pro-active IT procedures Payment Card Industry (PCI) compliance Controls in place that set expectations you have of your employees to take ownership and be aware of their responsibilities to protect sensitive information and do you require all employees to take annual training with respect to: Social media / appropriate use of e-mail and Internet at work policies Information Security and Privacy policy / Records management policy Mobile device security policy No plan survives first contact with the enemy 7

The Perfect Risk An Underwriter s Wish List Governance how engaged are the executive management and the board of directors in understanding security concerns? Is your industry or your brand a lightning rod? Where are your customers and employees domiciled? What are your Network Security and Privacy due diligence requirements when selecting vendors and subcontractors? Do you maintain an inventory that helps you understand what kind of data do you have and how you compartmentalize it: Personally identifiable information Personally identifiable healthcare information Confidential third party corporate client information How critical to your operations is your e-commerce platform? Do you plan and run tests of your protocols and apply the lessons learned from those tests to keep your policies, procedures and responses current and effective? 8

Traditional Products Versus Cyber Insurance 9

Gaps in Traditional Coverage General Liability Business Interruption Commercial Crime Professional Liability D&O Liability Kidnap, Ransom & Extortion Insurance 10

Cyber Liability Exposures Defence Costs Compensatory Damages arising from Injury SECURITY AND PRIVACY Unauthorized access to nonpublic information of others in your care, custody or control (PRIVACY) System to system issues, like virus transmission (CONDUIT) Impaired access that causes customers to suffer financial damage (IMPAIRED ACCESS) CONTENT Intellectual Property infringement (CONTENT) Defamation, product disparagement, dissemination of private facts (REPUTATIONAL) 11

Some First Party Breach Related Exposures (Response & Mitigation) Notification Public Relations Forensics Legal Crafting the content of the notification Notification dissemination and Customer response management Crisis Management Advertising & Press Releases Call Centre Operations Other Services for Affected Persons: Credit Monitoring Cost of forensic examination Cost to remediate discovered vulnerabilities Response to extortion threats Legal advice Compliance requirements Liability assessment 12

The Cyber Market 13

CyberSecurity by Chubb Private & Confidential