Updates within Network Security and Privacy Risk Management



Similar documents
Mastering Data Privacy, Social Media, & Cyber Law

Mastering Data Privacy, Protection, & Forensics Law

Network Security & Privacy Landscape

Cyber Liability & Data Breach Insurance Claims

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

Cyber Liability & Data Breach Insurance Claims

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

Cybersecurity. Are you prepared?

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

Are Data Breaches a Real Concern? Protecting Your Sensitive Information. Phillips Auction House NY- 03/24/2015

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

The Cyber Attack and Hacking Epidemic A Legal and Business Survival Guide

Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com

CYBER RISK SECURITY, NETWORK & PRIVACY

Embracing Cyber Risk: Insurance Solutions

Reducing Cyber Risk in Your Organization

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Cyber Liability & Data Breach Insurance Claims

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Cyber-Crime Protection

Discussion on Network Security & Privacy Liability Exposures and Insurance

cyber invasions cyber risk insurance AFP Exchange

ISO? ISO? ISO? LTD ISO?

Encryption Doesn t Always Protect Your Data. Presented by: Joe Sturonas PKWARE

Cyber Liability Insurance

Brief. The BakerHostetler Data Security Incident Response Report 2015

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider

Cybersecurity: Protecting Your Business. March 11, 2015

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group Ext. 7029

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Cyber Risks in Italian market

Data Breach and Senior Living Communities May 29, 2015

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?

Understanding Professional Liability Insurance

GALLAGHER CYBER LIABILITY PRACTICE. Cyber Risk Exposures and Solutions

Managing Cyber & Privacy Risks

Health Care Data Breach Discovery Strategies for Immediate Response

Privacy Rights Clearing House

Cyber, Security and Privacy Questionnaire

10 Smart Ideas for. Keeping Data Safe. From Hackers

Understanding the Business Risk

Privacy Liability & Data Breach Management Nikos Georgopoulos 1 st Athens Privacy & Data Breach Management Conference

Top Ten Technology Risks Facing Colleges and Universities

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

CGI Cyber Risk Advisory and Management Services for Insurers

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

STATE of the market ON CYBER RISK

Rogers Insurance Client Presentation

Cyber Insurance as one element of the Cyber risk management strategy

Joe A. Ramirez Catherine Crane

Cyber Risk Insurance for Agents. Frequently Asked Questions

2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage

I ve been breached! Now what?

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP

Cybersecurity Workshop

Cyber/ Network Security. FINEX Global

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

CYBER SECURITY SPECIALREPORT

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

Making Sense of Cyber Insurance: A Guide for SMEs

Transcription:

Updates within Network Security and Privacy Risk Management RIMS Minneapolis Meeting Melissa Krasnow, Partner, Dorsey & Whitney LLP (Minneapolis, MN) Mario Paez, Midwest Practice Leader for Tech., Privacy, Network Risk, Wells Fargo Insurance (Minneapolis, MN) Vern Suckerman, Senior Underwriter, XL Catlin Patrick Tatro, Senior Data Security Manager, Best Buy Corp. October 20, 2015 This presentation was created by Dorsey & Whitney LLP, 50 South Sixth Street, Suite 1500, Minneapolis, MN 55402. This presentation is intended for general information purposes only and should not be construed as legal advice or legal opinions on any specific facts or circumstances. An attorneyclient relationship is not created or continued by sending and/or receiving this presentation. Members of Dorsey & Whitney will be pleased to provide further information regarding the matters discussed in this presentation.

Agenda Recent breach statistics Legal update and the regulatory environment Underwriting insight & trends Information security perspective & threat trends 1

Statistics 2

Verizon 2015 data breach investigations report By the numbers 28.5% POS intrusions 18.8% crimeware 18% cyber espionage 10.6% insider misuse 2,122 confirmed data breaches (up from 1,367 in 2014) 79,790 reported security incidents (up from 63,437 in 2014) 61 countries represented (down from 95 in 2015) Verizon: 2015 Data Breach Investigations Report using 50 contributing global organizations. 3

NetDiligence 2015 claims study Findings Data type Cause of loss Business sectors PII - 45% PCI - 27% PHI - 14% Data Sample size 160 insured claims Hackers - 31% Malware virus 14% Staff mistakes 11% Rogue employees - 11% Lost/Stolen Laptop/Device 10% Paper Records 5% System Glitch 5% *In 2013, stolen laptops were #1 Healthcare sector - 21% Financial services - 17% Retail 13% Technology 9% Professional Services 8% Hospitality 4% Restaurants 4% Company size Nano-cap (under $50M revenue) & Micro-cap ($50M-$300M): 28% & 18% of incidents respectively Small-revenue ($300M-$2B revenue): 25% of incidents Large-revenue ($10-$100 billion) lost the most records (60%)(13% of incidents) Additional notes The average cost of a claim was $673,767 Average claim for a large company was $4.8 million Third parties accounted for 25% of the claims submitted 4

NetDiligence 2015 claims study Percentage of breaches by cause of loss Cyber Risk Claims: A Review of Industry Losses Paid Out - NetDilligence 2015 Study (Sample size = 160 insured claims) 5

NetDiligence 2015 claims study Percentage of breaches by business sector Cyber Risk Claims: A Review of Industry Losses Paid Out - NetDilligence 2015 Study (Sample size = 160 insured claims) 6

RIMS cyber survey 2015 51% of RIMS membership purchase stand-alone cyber insurance policies 58% of RIMS membership carry less than $20M in cyber coverage. 49% of those with under $20M in coverage are paying over $100k in premium. 74% of those without cyber coverage in place are considering procuring coverage in the next 12-24 months. The reported top three first party cyber exposures are: Reputational harm (79%); Business interruption (77%); Data breach response and notification (73%). Source: RIMS Cyber Survey May 2015 7

Current Regulatory Environment 8

2015 developments in state breach notification laws 47 states, plus the District of Columbia, Guam, Puerto Rico and Virgin Islands, have breach notification laws requiring breach notification to affected individuals; some of these laws have been amended http://www.irmi.com/articles/expertcommentary/state-breach-notification-lawscontinue-to-change Alabama, New Mexico, and South Dakota do not have breach notification laws Will there be a comprehensive federal breach notification law? 9

2015 developments in state cybersecurity laws and federal guidance Approximately 25% of states with breach notification laws also have security procedures laws; some of these laws have been amended http://files.dorsey.com/files/upload/krasnow-ma- Data-Security-Regulation-mar-2015.pdf Federal Trade Commission s Start with Security guidance https://www.ftc.gov/tips-advice/businesscenter/guidance/start-security-guide-business 10

2015 developments in incident response plan guidance; tabletop exercises; corporate governance Department of Justice s Best Practices for Victim Response and Reporting of Cyber Incidents http://www.justice.gov/sites/default/files/opa/spe eches/attachments/2015/04/29/criminal_division_ guidance_on_best_practices_for_victim_response _and_reporting_cyber_incidents.pdf http://www.irmi.com/articles/expertcommentary/guidance-for-incident-response-plans http://www.irmi.com/articles/expertcommentary/board-oversight-of-cyberrisksdirectors-and-officers-litigation 11

Insurance Trends 12

Underwriting due diligence Organization of their Information Security Team Information Assets / Sensitive Information (including PII, PHI & PCI-DSS) Administrative Information Security Controls Physical Information Security Controls Technology Security (Encryption, VPN, DLP, Monitoring, Scanning) POS Security / Controls (Retail/Hospitality/Etc.) Vendor Management Incident Response Plan Business Continuity Plan Audits/Testing Claims/Breaches Future Projects 13

Cyber underwriting trends / Insurance considerations Industry Retail/Hospitality Healthcare Financial services Schools/Public entities Understand what is included within the Definitions of the First Party Coverages when evaluating limits provided First Party coverage Triggers - Wrongful Act versus Knowledge of Executive Officers Notified Individuals versus Dollar Limit Approach (Required Vendor vs Flexibility of Vendors) PCI-DSS Coverage: What does it cover? Limits? Carveback of Contractual Liability Exclusion Other Coverages to Purchase: Business Interruption (Security failure vs. System failure) Data Loss / Restoration Dependent Business Interruption Network or Systems Failure Reputational Damage (mostly London markets) Medial Liability Electronic Media vs Broad Form Media 14

Insurance claims takeaways Most significant claims activity have been on Healthcare and Retail Healthcare malware and lost laptops/removable devices Retail malware on POS network Financials Services Frequency of activity on the public entity side (CryptoLocker claims) Utilities Many Human Error type incidents Lost laptops and other removable devices. Data Loss incidents inadvertent emails with confidential information Media Claims Invasion of privacy (example emails and other communications) Intellectual Property 15

Threat Landscape 16

Who s Got Your 6? 17

Information Sharing 18