Cyber Insurance Presentation



Similar documents
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

CYBER RISK SECURITY, NETWORK & PRIVACY

Mitigating and managing cyber risk: ten issues to consider

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS Data Breach : The Emerging Threat to Healthcare Industry

How To Cover A Data Breach In The European Market

Cyber Insurance as one element of the Cyber risk management strategy

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

Data Breach and Senior Living Communities May 29, 2015

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

Beyond Data Breach: Cyber Trends and Exposures

Managing Cyber Risk through Insurance

Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks

Cyber/ Network Security. FINEX Global

Privacy / Network Security Liability Insurance Discussion. January 30, Kevin Violette RT ProExec

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Airmic Review of Recent Developments in the Cyber Insurance Market. & commentary on the increased availability of cyber insurance products GUIDE

Cyber Liability. AlaHA Annual Meeting 2013

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

National Corporate Practice. Cyber risks explained what they are, what they could cost and how to protect against them

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

cyber invasions cyber risk insurance AFP Exchange

Discussion on Network Security & Privacy Liability Exposures and Insurance

Cyber-Crime Protection

CYBER/ NETWORK SECURITY

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

ISO? ISO? ISO? LTD ISO?

Joe A. Ramirez Catherine Crane

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Cyber Risks in Italian market

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal

NZI LIABILITY CYBER. Are you protected?

CAGNY Spring 2015 Meeting Fundamentals of Cyber Risk. Brad Gow June 9th, 2015 Endurance

Understanding the Business Risk

Cyber Risks and Insurance Solutions Malaysia, November 2013

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Policy Considerations for Covering Special Exposures. Claire Lee Reiss Program Director National League of Cities Risk Information Sharing Consortium

Cyber Risk State of the Art

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

What Data? I m A Trucking Company!

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day

DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET

Cyber and data Policy wording

Cybercrime: risks, penalties and prevention

Managing Cyber & Privacy Risks

Cyber Exposure for Credit Unions

Privacy and Data Breach Protection Modular application form

Preventing And Dealing With Cyber Attacks And Data Breaches. Arnold & Porter LLP Lockheed Martin WMACCA February 12, 2014

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider

Cyber Threats: Exposures and Breach Costs

Understanding. your Cyber Liability coverage

Insurance & Risk Management Update: November 2011

Practical Cyber Law: Why the Standard of Care Requires Lawyers to Have a Basic Understanding of Cyber Insurance

erisks Policyholder s Guide to Privacy & Security Breach Response Planning

Internet Stolen: The Fastest Growing White Collar Crime

ANATOMY of a DATA BREACH DISASTER. Avoiding a Cyber Catastrophe. June, Sponsored by:

Cyber and Data Security. Proposal form

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Is Cyber Insurance the Next Big Think? 2nd Digital Payments Summit - May Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

Law Firm Cyber Security & Compliance Risks

Insurance implications for Cyber Threats

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:

IAPP Global Privacy Summit 2014 The SEC and Cybersecurity: What Every Publicly Traded Company Must Know

Allianz Global Corporate & Specialty. Cyber Risks. Recent Trends. AIRMIC 15 th June 2015

Cyber Liability Insurance

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.

Technology, Privacy and Cyber Protection Modular application form

Cyber Risk Insurance for Agents. Frequently Asked Questions

What would you do if your agency had a data breach?

CYBER SECURITY SPECIALREPORT

Cyber Security Issues - Brief Business Report

Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact. February 10, 2015

PRODUCT HIGHLIGHTS CYBER SECURITY LIABILITY

CYBER RISK INSURANCE. Presented By: Jonathan Healy

CYBER BRIEF A SEMI-ANNUAL PUBLICATION FROM YOUR WNA FINEX CLAIM & LEGAL GROUP

DATA BREACH COVERAGE

How To Protect Your Data From Hackers

Data Breach Notification Duty. Dr. Elisabeth Thole 31 October 2015 UIA Valencia

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Incentives and barriers for the cyber insurance market in Europe

Insurance for Professionals

Rogers Insurance Client Presentation

Coverage is subject to a Deductible

Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age

9/13/2011. Miscellaneous Current Topics in Healthcare Professional Liability. Antitrust Notice. Table of Contents. Cyber Liability.

Cyberinsurance: Insuring for Data Breach Risk

CYBER RISK MANAGEMENT IN THE BOATING INDUSTRY

Specialty Risk Protector

Transcription:

Cyber Insurance Presentation

Presentation Outline Introduction General overview of Insurance About us Cyber loss statistics Cyber Insurance product coverage Loss examples Q & A

About Us

A- Rated reinsurance company Top tier Zimbabwean reinsurer Financially sound entity Innovative reinsurance solutions provider Over 21 years old

Overview of insurance

974 million records compromised in 2014 = 31 per second 188 days average time taken to identify a breach $400bn Est global annual cost cybercrime 81% percentage don t detect breach themselves

Cyber Loss background A company like yours

Recap: Risks posed by an information security breach Reputational damage System unavailability and downtime Loss of revenue, data or competitive advantage Litigation arising from compromised data Costs incurred in responding to an incident: Legal defence and settlement Forensic investigation Affected party notification and remediation Public relations costs Industry / regulatory fines and penalties

Cyber Insurance What is it? Also thought of as information or data breach insurance, provides cover for information and network security breaches Effectively transfers breach response function to insurer Specifically tailored to address intangible property and non-physical perils First party and third party cover

First party cover

Loss or damage to digital assets loss or damage to data or software programs, resulting in cost being incurred in restoring, updating, recreating or replacing these assets to the same condition they were in prior to the loss or damage

Business interruption from system downtime Interruption, degradation in service or failure of the network, resulting in loss of income, increased cost of operation and/or cost being incurred in mitigating and investigating the loss

CyberExtortion Attempt to extort money by threatening to damage or restrict the network, release data obtained from the network and/or communicate with the customer base under false presences to obtain personal information

Reputational damage Arising from a data protection breach being reported (whether factually correct or not), that results in loss of intellectual property, loss of income, loss of customers and/or increased cost of operation

Theft of money and digital assets direct monetary losses and associated disruption from theft of computer equipment, as well as electronic theft of funds / money from the organisation by hacking or other type of cyber crime

Third Party Coverage

Liability for damage to or corruption / loss of thirdparty data or information, including payment of compensation to customers for denial of access, failure of software, data errors and system security failure Jeep hacked Third Party Coverage

Third Party Coverage Defense costs Forensic Investigation costs Fines and penalties Regulatory fines Industry associations fines

Examples of claims Physician s work laptop stolen, 37,000 records compromised Legal counsel - notification requirements, the response process Department of Health and Human Services investigation Counsel provide proof of strong privacy controls and training procedures Estimated cost to respond to the breach (at $10 per record): $370,000

Examples of claims Plastic surgeon posted unauthorized before and after photos of several patients on her website Issue was discovered when a patient performed a Google search on herself, and the explicit pictures showed up in the search 15 invasion of privacy actions against the plastic surgeon to date, with several settling in the range of $150,000 per plaintiff Additional legal expenses incurred: $50,000

A poor Man will always say there are no thieves in the neighborhood Contacts Cuthbert.masukume@fbc.co.zw www.fbc.co.zw/reinsurance Thank you.