Insurance implications for Cyber Threats



Similar documents
CYBER RISK SECURITY, NETWORK & PRIVACY

How To Cover A Data Breach In The European Market

Cyber/ Network Security. FINEX Global

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Managing Cyber Risk through Insurance

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

NZI LIABILITY CYBER. Are you protected?

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Understanding the Business Risk

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Insuring Innovation. CyberFirst Coverage for Technology Companies

Cyber Insurance Presentation

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

LETTER TO BROKERS. Today we are launching Reputation Risk Solutions Limited:

UNDERSTANDING INSURANCE OPTIONS For start-up Hedge Funds. Tailor made advice

Cyber Insurance: How to Investigate the Right Coverage for Your Company

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

Our specialist insurance services for Professionals risks

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

Cyber Risks in Italian market

Joe A. Ramirez Catherine Crane

Cyber Threats and the Insurance Response

ISO? ISO? ISO? LTD ISO?

Data Breach and Senior Living Communities May 29, 2015

Cyber Risk Insurance for Agents. Frequently Asked Questions

Cybercrime: risks, penalties and prevention

The promise and pitfalls of cyber insurance January 2016

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

Specialty Risk Protector

Rogers Insurance Client Presentation

Cyber Threats: Exposures and Breach Costs

Lost in Cyber Space? Cyber Risks and (Re-) Insurance

Tools Conference Toronto November 26, 2014 Insurance for NFP s. Presented by Paul Spark HUB International HKMB Limited

National Corporate Practice. Cyber risks explained what they are, what they could cost and how to protect against them

Airmic Review of Recent Developments in the Cyber Insurance Market. & commentary on the increased availability of cyber insurance products GUIDE

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Cyber and Data Security. Proposal form

CREDIT, POLITICAL & SECURITY RISKS ANALYTICS & CONSULTANCY. Protecting business and securing opportunity

ACE European Risk Briefing 2012

EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND?

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

CYBER/ NETWORK SECURITY

An Introduction to Cyber Liability Insurance. Catherine Berry Senior Underwriter

What is Cyber Liability

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

CYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America

Mitigating and managing cyber risk: ten issues to consider

Aon Risk Solutions Global Risk Consulting Captive & Insurance Management. Cyber risk and the captive market - a match made in the cloud?

OECD PROJECT ON CYBER RISK INSURANCE

Cyber and data Policy wording

Cyber Risks and Insurance Solutions Malaysia, November 2013

Cyber Risk Management

2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage

THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance

cyber invasions cyber risk insurance AFP Exchange

Cyber-Crime Protection

Cybercrime Security Risks and Challenges Facing Business

Privacy and Data Breach Protection Modular application form

How To Get A Security Insurance Policy From Jlt.Com

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

Airmic review of the supply chain insurance market Review of recent developments in the supply chain insurance market

How To Protect Your Business From A Cyber Attack

Technology, Privacy and Cyber Protection Modular application form

MANAGEMENT LIABILITY BLIND SPOTS. Insurance coverage insights for Logistics, Transportation, Supply Chain, and Technology Companies

Navigating Cyber Risk Exposure and Insurance. Stephen Wares EMEA Cyber Risk Practice Leader Marsh

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

CYBER RISK INSURANCE. Presented By: Jonathan Healy

Transcription:

Lillehammer Energy Claims Conference Lillehammer March 7, 2014 Insurance implications for Cyber Threats How enterprises need to prepare for the inevitable

JLT is one of the world s largest providers of insurance and employee benefits related advice, brokerage and associated services. Part of the Jardine Lloyd Thompson Group, JLT Specialty provides insurance broking and risk management services across the globe. As a specialist insurance broker it focusses on sectors where it can make the greatest difference to clients - working hard to understand the challenges they face and using insight, intelligence and imagination to provide expert advice and robust often unique solutions With over 900 employees and revenues of more than GBP240m in 2012, it places more than GBP2bn of premium into the insurance market every year. More detailed financial slides are available on the Group website http://www.jltgroup.com/investors/analyst-presentations/

Key trends for Oil & Gas What drives risk exposures Networked infrastructure Hackers, Groups and Hacktivism Technology innovation High profile Cyber attacks Data as a differentiator Cybercrime economy 3

Where are the Cyber Threats coming from? Rogue employees Careless staff Contractors Social media/networking Internal Technology ICS/SCADA systems Payment systems Mobile Devices, Internet of Things/M2M Structural vulnerability of systems or in supply chain Cloud Computing Old school Crime/Espionage/Terror: Foreign & Domestic criminals/hackers Competitors Third-party contractors States External Regulatory Stupidity/carelessness Laptop theft Dumpster diving Phishing, Smishing, etc. Data Privacy Legislation Security Directives National Security

Global Cyber Event Heatmap

What could insurance have covered? Some real examples Saudi Aramco - 2012 - Shamoon virus Isolated to corporate network Destroyed hard drives and erased data Did not directly affect hydrocarbon exploration/ production systems Loss of data Productivity losses Expenses RasGas - 2012 Hacker attack Attack shut down website and email servers Productivity losses Expenses Chevron 2010 - Virus Struxnet Servers infected by virus Virus did not have any adverse effects Expenses

Cyber Events - Insurable Consequences Business disruptions Physical damage: property damage ensuing from cyber event or technology failure Revenue loss: business interruption caused by cyber event or other IT failures (importantly, both physical and non-physical triggers) Consequential loss: IT failure or cyber event at suppliers or customers leading to a consequential loss to you. Cyber terrorism: cyber terrorists attacks corporates or public infrastructure with resulting property damage, business interruption, increased costs of working, mitigation costs, liabilities etc. Denial of Service: IT failure leading to a consequential loss to customers caused by inability to access their services and/or data

Cyber Event Insurable Consequences Data Breach/Loss of Data First Party exposures for privacy breaches: notification costs, fines and penalties, regulatory actions and crisis management expenses incurred after an event. Third Party exposures for privacy breaches: liability for customers liabilities/losses in respect of a breach Cyber liability/transmission of malware: for example, corruption of customers data due to the transmission of malware through the corporate s systems Loss or corruption of your own and customer data: loss of valuable data and the resultant liabilities (including intellectual property)

Cyber Event Insurable Consequences Failure to Service Errors and Omissions: IT/network security or failure event leading to the failure to service customers or general failure of a product/service or to meet advertised specifications Cyber extortion: IT systems/services being held ransom by a third party and the associated costs/ransom payments. The result could be failure to service customers Denial of Service: IT failure leading to a consequential loss to customers caused by inability to access their services and/or data. Viewed as breach of service Reputational damage: mitigation/proactive action (including crisis management/public relations expenses) and the potential for increased customer churn in the short, medium and long-term.

Cyber Event insurable Consequences - Cyber Crime, Extortion and Terrorism Financial losses caused by cybercrimes by employees or third parties Cyber extortion: IT systems/services being held ransom by a third party and the associated costs/ransom payments Cyber terrorism: terrorism attacks directly onto corporates or onto public infrastructure which leads to resultant property damage, business interruption, increased costs, mitigation costs, liabilities etc.

Cyber Event Insurable Consequences Other Negative Outcomes Media liability: libel, slander and disparagement in respect of broadcasting, content and related media Intellectual Property Rights infringement: infringing upon a third party s IPR or defending first party IP from infringement/invalidity (includes copyright, trademark, digital rights, patent etc.). Directors and Officers Liability: a significant cyber breach/event could lead to a class action, or action by shareholders/other stakeholders against the management of the corporate. Reputational damage: mitigation/proactive action (including crisis management/public relations expenses) and the potential for increased customer churn in the short, medium and long-term.

Where can I find Cyber Insurance protection? Traditional Insurance Policies Bespoke Cyber/Technology Risk Insurance Property Damage/ Business Interruption Terrorism/Political Violence General Liability Non-Tech Professional Indemnity/E&O Crime Directors & Officers Cyber IT systems Business Interruption - Not including ensuing physical damage Cyber Extortion Cyber Crime Loss of Data/ Privacy Breach Technology Professional Indemnity/Errors & Omissions First Party Risks; damage to you Third party risks; damage to others

Cover for cyber related losses in Traditional Insurance polices? Typically not. But If you have a bespoke policy and agreement with insurer Insurers have incorporated exclusions in many traditional policies that may exclude coverage for damage caused by malicious code. But where those exclusions are limited, or absent, policyholders should check their traditional policies for coverage There may be limited cover for certain expenses for things such as to reconstitute/restore data Advertising liability in certain liability policies Typically physical damage ensuing from a cyber event is excluded JLT PV/Terror markets willing to modify cyber exclusions to effectively cover resulting physical damage/reinstatement of assets. Business interruption still excluded 14

Where can I find Bespoke Cyber Insurance protection? Appx. 30 insurers offer Cyber: $250 to $500m Data Breach/Cyber Liability $100m Non Damage BI Non-Damage BI requires further science Bespoke Cyber/Technology Risk Insurance Cyber IT systems Business Interruption - Not including ensuing physical damage Cyber Extortion First Party Risks; damage to you Physical Damage from a Cyber event not offered or very limited Manuscript Cyber policies available on All Risk basis Cyber Crime Loss of Data/ Privacy Breach Technology Professional Indemnity/Errors & Omissions Third party risks; damage to others

Cyber Insurance Limitations of the market currently Lack of coverage consistency 1 st party limits available are not meaningful to large companies Aggregation and Cyber Hurricane concerns to underwriter Lack of reinsurance and sufficient cash reserves = lack of limits Avoidance from traditional insurers don t like or understand Cyber Insurers typically do not like SCADA/ICS (ensuing PD/BI) Lack of data leads to problems the risk analysis & quantification What are the type and quantum of losses that I can have? Lack of public actuarial data = lack of refined pricing

Driving the Cyber Insurance market? Critical National Infrastructure Protection Fund Norwegian Cyber Skade Insurance Fund Cyber Re - Government as insurer of last resort (Pool Re) Cyber Risk Insurance Act (TRIA) Cyber Safety Act EU standards of Due Care for IT Network Security Risk Encourage/Mandated cyber data sharing Honest broker? Government purchasing power mandate cyber insurance Oil & Gas industry cyber initiatives? Cyber Mutual Re

Cyber Insurance How to obtain the right product? Know your risks before you buy!! Cyber Risk Workshops Cyber risk and gap analysis Carefully select your risk transfer partners and use your captive(!) Loss scenario stress-testing Claims mapping across your whole insurance program Specialized services to help manage a loss

Failing to manage the risk Not really an option

Conclusion The world is changing, and fast! Profiles have shifted from physical to non-physical Intangible assets Technology and data dependency and interconnections (not meant to!!) New catastrophe exposures are presented by IT/Network Security and further complicated by the adoption of cloud, mobile technology & BYOD Compliance with regulatory requirements is becoming more challenging Traditional insurance protection or arrangements will not do the job! Begin to identify, understand, map and share the exposure data related to Cyber! Do the work and future insurance protection can be a protection effective investment given the rapidly increasing level of risk we are facing Focus needs to be applied into risk identification, data sharing and quantification, benchmarking and loss analysis as well as integrated insurance and risk management solutions 20

Questions? Thank you Fredrik Motzfeldt MBA CPCU Partner - JLT Communications, Media & Technology Risk Practice JLT Specialty Limited The St Botolph Building 138 Houndsditch London EC3A 7AW UK Direct Dial: +44 (0)207 558 3718 Mobile: +44(0) 7785 632 857 21