Understanding the Business Risk



Similar documents
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

Joe A. Ramirez Catherine Crane

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Rogers Insurance Client Presentation

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal

Managing Cyber Risk through Insurance

Cyber Insurance Presentation

Data Privacy, Security, and Risk Management in the Cloud

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Mitigating and managing cyber risk: ten issues to consider

CYBER RISK SECURITY, NETWORK & PRIVACY

Privacy / Network Security Liability Insurance Discussion. January 30, Kevin Violette RT ProExec

THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill

Cyber Liability Insurance: It May Surprise You

Discussion on Network Security & Privacy Liability Exposures and Insurance

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Cybersecurity Risk Transfer

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

NZI LIABILITY CYBER. Are you protected?

Insuring Innovation. CyberFirst Coverage for Technology Companies

Cyber/ Network Security. FINEX Global

Data Breach and Senior Living Communities May 29, 2015

CyberSecurity for Law Firms

ISO? ISO? ISO? LTD ISO?

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

Insurance implications for Cyber Threats

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS

ACE Advantage PRIVACY & NETWORK SECURITY

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:

An Introduction to Cyber Liability Insurance. Catherine Berry Senior Underwriter

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

Zurich Public Sector Solution

Cyber-Crime Protection

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

cyber invasions cyber risk insurance AFP Exchange

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider

Zurich Security And Privacy Protection Policy Application

Managing Cyber & Privacy Risks

Beazley presentation master

Network Security & Privacy Landscape

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

Tools Conference Toronto November 26, 2014 Insurance for NFP s. Presented by Paul Spark HUB International HKMB Limited

DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

How To Cover A Data Breach In The European Market

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

What Data? I m A Trucking Company!

Cyber Liability. What School Districts Need to Know

CYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America

Cybersecurity. Are you prepared?

What is Cyber Liability

Embracing Cyber Risk: Insurance Solutions

Cyber, Security and Privacy Questionnaire

Cyber and CGL Insurance Coverage for Data Breach Claims

Cyber-insurance: Understanding Your Risks

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group Ext. 7029

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?

National Corporate Practice. Cyber risks explained what they are, what they could cost and how to protect against them

Privacy and Data Breach Protection Modular application form

Transcription:

AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 jgold@andersonkill.com

Disclaimer The views expressed by the participants in this program are not those of the participants employers, their clients, or any other organization. The opinions expressed do not constitute legal advice, or risk management advice. The views discussed are for educational purposes only, and provided only for use during this session. 2

Identify the Exposure Hackers Rogue Employees Independent Contractors Human Error Social Media Mobile Devices Cloud Computing A Changing Regulatory Environment 3

INSURANCE POLICIES COVERING LOSS. Take Inventory of Insurance Policies GL, D&O, E&O, Crime, All Risk Property, Cyber Policies Match the coverage to the type of exposure: e.g., 1 st Party, 3 rd Party, Hybrid of the two, etc. 4

COVERAGE UNDER CGL? IP Exposure Data Loss Business Interruption Third Party Losses Privacy 5

WHEN CONVENTIONAL IS NOT ENOUGH. Consider Cyber Policies, but beware! 6

The Marketplace View Is That Current Cyber Options Offer Insurance For: Privacy Injury Liability Privacy Regulatory Proceedings and PCI Fines Network and Content Liability Crisis Management Fund Network Loss or Damage Business Interruption Electronic Theft Network Extortion 7

The Insurance Policy Network Security Liability Privacy Liability Media Liability Regulatory Liability Breach Response / Crisis Management Data Recovery Business Interruption Cyber Extortion Exposure Category Notification / Legal Expense Credit Monitoring Expense Forensic Investigations Public Relations Technology Services/Products & Professional Errors & Omission Liability Description Promises liability coverage if an Insured's Computer System fails to prevent a Security Breach or a Privacy Breach Promises liability coverage if an Insured fails to protect electronic or nonelectronic information in their care custody and control Promises coverage for Intellectual Property and Personal Injury perils the result from an error or omission in content (coverage for Patent and Trade Secrets are generally not provided) Promises coverage for lawsuits or investigations by Federal, State, or Foreign regulators relating to Privacy Laws Promises to pay 1st Party expenses to comply with Privacy Law notification requirements ; In many instances goodwill notification; Legal Advisory Promises to pay 1st Party expenses to provide up to 12 months credit monitoring Promises to pay 1st Party expenses to investigate a system intrusion into an Insured Computer System Promises to pay 1st Party expenses to hire a Public Relations firm Promises to pay 1st party expenses to recover data damaged on an Insured Computer System as a result of a Failure of Security Promises to pay 1st party expenses for lost income from an interruption to an Insured Computer System as a result of a Failure of Security Promises payments to a party threatening to attack an Insured's Computer System in order to avert a cyber attack Brokers Indicate that Technology Products & Services and Miscellaneous E&O can be added to a policy when applicable 8

RISK MANAGEMENT CONSIDERATIONS Viruses: Coverage or Exclusion Virus Defined in a Manner that Might Affect Hacker Coverage if it s an exclusion? Watch definitions like a hawk: Confidential Information vs. Trade Secrets vs. Customer Information Coverage for Regulatory Matters (e.g., FTC) Modules approach ; different definitions for different sections? 9

Cyber Policy Considerations Conditions and exclusions involving data security efforts / protective measures of policyholder; Coverage for Network Computers Only? What about Laptops? Insured Property / Locations / Premises; Where are Servers / Computers Housed? D&O type claim exclusions 10

TIME SENSITIVE PROVISIONS. Fear of Reporting Claims? Timely Notice Proofs of Loss Suit Limitation Clauses 11

Litigation Issues When Fighting For Coverage Of Cyber Claims Not Much Precedent What Exists is Not Uniform Policy language is often not uniform Careful What Gets Disclosed During Discovery: E.g., Sensitive Data, Customer Information, Network Security Blueprints 12

QUESTIONS? Have a question that we did not get to address during Joshua Gold s Presentation on Cyber Security Insurance & Risk Management Issues? Please send your question to: jgold@andersonkill.com -or- Call Josh at: (212) 278-1886 13

Thank You Joshua Gold, Esq. (212) 278-1886 jgold@andersonkill.com 14