Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC



Similar documents
Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

CYBER RISK SECURITY, NETWORK & PRIVACY

Cyber Exposure for Credit Unions

Cyber/ Network Security. FINEX Global

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

Network Security & Privacy Landscape

Mitigating and managing cyber risk: ten issues to consider

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

Managing Cyber Risk through Insurance

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group Ext. 7029

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Data Breach and Senior Living Communities May 29, 2015

Discussion on Network Security & Privacy Liability Exposures and Insurance

Cyber Threats: Exposures and Breach Costs

Why Encryption is Essential to the Safety of Your Business

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS Data Breach : The Emerging Threat to Healthcare Industry

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

cyber invasions cyber risk insurance AFP Exchange

Cyber and Data Security. Proposal form

Beyond Data Breach: Cyber Trends and Exposures

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA Toll Free: (877) IRON411

How-To Guide: Cyber Security. Content Provided by

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

9/13/2011. Miscellaneous Current Topics in Healthcare Professional Liability. Antitrust Notice. Table of Contents. Cyber Liability.

Cyber Insurance Presentation

ISO? ISO? ISO? LTD ISO?

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

CYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Joe A. Ramirez Catherine Crane

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Identity Theft Security and Compliance: Issues for Business

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

DATA BREACH COVERAGE

Cyber Risks in Italian market

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Network Security & Privacy Landscape

Coverage is subject to a Deductible

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

Cyber-Crime Protection

PCI Compliance for Healthcare

Managing Cyber & Privacy Risks

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec

The Business Case for Security Information Management

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Cyber Liability. AlaHA Annual Meeting 2013

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

CYBER RISK INSURANCE. Presented By: Jonathan Healy

Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks

Cyber and data Policy wording

Enterprise PrivaProtector 9.0

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

How To Cover A Data Breach In The European Market

Cyber Liability. What School Districts Need to Know

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS

National Corporate Practice. Cyber risks explained what they are, what they could cost and how to protect against them

Cyber, Security and Privacy Questionnaire

Aftermath of a Data Breach Study

CAGNY Spring 2015 Meeting Fundamentals of Cyber Risk. Brad Gow June 9th, 2015 Endurance

Privacy Rights Clearing House

Our specialist insurance services for Professionals risks

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

The Growing Problem of Data Breaches in America

Privacy / Network Security Liability Insurance Discussion. January 30, Kevin Violette RT ProExec

Understanding the Business Risk

Cybercrime: risks, penalties and prevention

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Insurance implications for Cyber Threats

Cyber Risks and Insurance Solutions Malaysia, November 2013

What Data? I m A Trucking Company!

Practical Cyber Law: Why the Standard of Care Requires Lawyers to Have a Basic Understanding of Cyber Insurance

Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com

Cyber Risks October

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

Cyber Liability & Data Breach Insurance Claims

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution

CSR Breach Reporting Service Frequently Asked Questions

Making Sense of Cyber Insurance: A Guide for SMEs

DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

CYBER/ NETWORK SECURITY

CyberSecurity for Law Firms

YOUR TRUSTED PARTNER IN A DIGITAL AGE. A guide to Hiscox Cyber and Data Insurance

Information and Communication Technology, Cyber and Data Security

Cyber Risk Insurance for Agents. Frequently Asked Questions

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution

Transcription:

Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC

Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you understand the exposures and mitigate the risks In this document: What is a data breach? How and why do breaches occur High profile breach events Is your client exposed? Why purchase a stand alone policy? Coverage's explained About the markets How to proceed Contact us Award winning service About Lloyd Guidry Appendix breach facts Appendix - legislation

What is a data breach? A data breach is a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so A data breach can vary from state to state as can definitions. Of the 50 US jurisdictions, currently 46 states have regulatory requirements in place for a breach Are you exposed? Do you store, hold or even pass onto third parties personal information about clients or employees? If you do then you will have an exposure to the legal and regulatory ramifications of a data breach. According to Ponemon $214 is the average cost to a company for every stolen or misplaced record.

How and why do breaches occur? All IT departments will tell you they are invincible, So how does it happen and why? Breaches occur externally or internally. Small organisations have a higher proportion of cyber crimes relating to malicious code and malware. Large organisations have a higher proportion due to disgruntled employees, stolen or lost devices. Examples of external breaches Hackers Organised crime Extortion Competitors Outsourcers Examples of internal breaches Communications transmitted to the incorrect recipient Non-encrypted file transfer protocol Failure of hardware and/or security software 3 rd party vendor or contractor Lost laptop, PDA or other data storage device Rogue employee

High profile breach events Sony In May 2011, Sony exposed information from more than 100 million user accounts. Hackers obtained personal information, including credit, debit, and bank account numbers. Estimates are that the breach could cost Sony and credit card issuers up to a total of $2 billion. Epsilon In March 2011, hackers stole millions of names and e-mail addresses with an initial estimated cost of up to $4 billion. The high cost was attributed to loss of business and reputation.

High profile breach events US Veterans Affairs The names, birth dates and social security numbers of 17.5+ million military veterans and personnel were stolen from a laptop an employee took home. Costs included money for running call centres, sending out mailings and paying for a year of credit-monitoring services for victims. Estimates of the cost are around $25 million. The VA has had two more breaches since. Heartland Payment Systems In 2009, HPS reserved $130 million for lawsuits after malware* was uploaded on systems by hackers. TJ Maxx In 2007, the retailer had a data breach where cyber criminals took more than 45 million credit and debit card numbers. Total cost $250m+. *malware = short for malicious software, consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behaviour.

Are you exposed? What information do you have? Where is it stored? Is it encrypted? How easy is it for someone to access? Are you confident in the security you have? Do you continually update your security? A stolen laptop or one taken home by an employee, is the biggest cause of data breaches at corporations according to the Ponemon 2010 annual study: US cost of a data breach Do laptops leave their premises? See US Veteran Affairs case study

Why purchase a standalone policy? Crime, CGL, K&R and property policies may not cover data breaches as they only apply to tangible assets and courts have held that data isn t property. Standard commercial E&O policies will not cover or respond to the services required and needed for a breach. Loss of income/revenue would similarly not be covered. Specialist standalone policy forms are a specific approach to an exposure which is volatile and uncertain.

Coverage's explained 1 st party Business income/dependent business income loss Reimbursement of loss of income due to a suspension of computer systems (time frame deductible). Reimbursing loss of income due to a data breach to a dependent business partner during the policy period. Notification and credit monitoring/crisis management The cost of notifying the individuals whose data has been compromised and the offering of services to monitor suspicious credit activity. Data asset restoration/forensics Reimbursement of costs to recover, reinstate and recreate intangible assets destroyed during a cyber attack. Forensics obtained to determine what and whose information was stolen. Cyber extortion threat Reimbursing investigation expenses and ransom payments resulting from malicious threats to your organisation s computer system.

Coverage's explained 3 rd party Privacy liability/employee liability Class actions and suits brought (including employees) which result in a monetary payment due to the disclosure of a persons private and confidential information. Regulatory defence and civil penalties Investigation, fines and penalties (where Insurable by law) that you are legally required to pay. Media liability Legal liability arising from media content transmitted on any computer system. Harm suffered by others due to an infringement of an intellectual property right. Defamation and slander.

About the markets Established capacity Lloyd Guidry has access to global privacy markets with London capacity itself of more than $100 million Market choice There are 30+ different markets offering primary and excess solutions. London markets can consider full limits, for all cyber coverage's for certain risks. Worldwide London markets write privacy worldwide, where regulation does not apply in some jurisdictions, voluntary notification with underwriter consent obtainable for best practices Tailored to your clients needs We tailor policy wordings to best suit your specific requirements.

How to proceed Discuss exposures Complete an application form for a non-binding indication Review coverage Network security review provided by underwriters Security recommendations implemented if required Quote provided Policy bound

Contact us For further information, please contact: Brian Wright brian.wright@lloydguidry.com +44 (0)20 3397 0951 Michael Guidry michael.guidry@lloydguidry.com +44 (0)20 3397 0953 www.lloydguidry.com

Award winning service 2008 UK Broker Awards 2002 The British Insurance Awards 2000 The British Insurance Awards 1999 The British Insurance Awards 2001 The Insurance Times Awards 1999 Insurance Industry Awards 1999 Insurance Industry Awards

About Lloyd Guidry Established in 2008, Lloyd Guidry is organised into specialist market-facing business units, and managed so that we can rapidly assemble multi-skilled service teams. Key facts Independent specialist insurance and reinsurance broker 100% growth over the previous year Continual investment in people, products and technology Utilising Lloyd s of London and London Market providing A Grade security www.guidry.com www.lloydwrightins.com www.mai-cee.com Placing platforms in London, Houston and Riga.

Appendix - other breach events Gucci A disgruntled ex-employee gained access, deleted files and shut down the server for 24 hrs. This cost Gucci an estimated $200,000. BP A laptop was lost which contained 13,000 Louisiana oil spill claimants information. Briar Group A group of restaurants in Boston who failed to patch a security hole. The were fined $110,000 plus ordered to improve data security by implementing a password management system. Kaiser Permanente 150 patient names, address and medical files were posted online and accessible for 4 years. The company was fined $200,000.

Appendix - case studies Potential event Disgruntled employee posting on a blog/social networking site How a policy responds Slander Defamation Malware permitted entry to a banks online banking system Forensics Hacker breaks into network, steals customer data, threatens to post publicly or sell it Cyber extortion Liability An employee s laptop or USB is stolen containing customers information Notification Credit monitoring Foreign hackers penetrate defence networks in an attempt to steal information on an unmanned aircraft Cyber terrorism

Appendix data breach facts Source: Ponemon 2010 annual study: US cost of a data breach For the fifth year in a row data breach costs have continued to rise Breaches by third party outsourcers are becoming slightly less common but more expensive Breaches involving lost or stolen laptops computers or other mobile devices remain a constant and expensive threat First timers pay the highest breach costs

Appendix data breach legislation Gramm Leach Bliley Act (GLBA) Health Insurance Portability Accountability Act (HIPAA) ISO 17799 PCI DSS Sarbanes Oxley Act COBIT FFIEC Guidelines COPPA Amendment to S.B. 1386 (California) effective January 1st 2012 Red Flags Rule Amendment Privacy Act of 1974 CAN SPAM Act