Cybersecurity: Emerging Exposures for Technology Companies. October 7, 2010



Similar documents
Privacy Law Basics and Best Practices

The Liability of Technology Companies for Data Breaches

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Data Breach and Senior Living Communities May 29, 2015

Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Privacy and Data Breach Protection Modular application form

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS Data Breach : The Emerging Threat to Healthcare Industry

Privacy Legislation and Industry Security Standards

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Managing Cyber Risk through Insurance

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal

Zip It! Feds, State Strengthen Privacy Protection. Practice Management Feature July Tex Med. 2012;108(7):33-37.

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Technology, Privacy and Cyber Protection Modular application form

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?

HIPAA Security Rule Compliance

Data Breach Response Planning: Laying the Right Foundation

Understanding. your Cyber Liability coverage

CAGNY Spring 2015 Meeting Fundamentals of Cyber Risk. Brad Gow June 9th, 2015 Endurance

Data Privacy & Security: Essential Questions Every Business Must Ask

Best Practices in Incident Response. SF ISACA April 1 st Kieran Norton, Senior Manager Deloitte & Touch LLP

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group Ext. 7029

Managing Cyber & Privacy Risks

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Data Privacy, Security, and Risk Management in the Cloud

cyber invasions cyber risk insurance AFP Exchange

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Enterprise PrivaProtector 9.0

Rogers Insurance Client Presentation

Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

Cyber Threats: Exposures and Breach Costs

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

Cyber Risks and Insurance Solutions Malaysia, November 2013

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA Toll Free: (877) IRON411

Cyber Risks in the Boardroom

ISO? ISO? ISO? LTD ISO?

HIPAA Privacy and Security Changes in the American Recovery and Reinvestment Act

The Data Breach: How to stay defensible before, during and after the incident. Alex Ricardo, CIPP/US Breach Response Services

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

Understanding the Business Risk

POLICIES TO MITIGATE CYBER RISK

Cyber Exposure for Credit Unions

Data Security: Risks, Compliance and How to be Prepared for a Breach

4/30/2015 CYBER LIABILITY AND AVIATION AGENDA LEARNING OBJECTIVES. Presented by Hal Hunt May 3, 2015

Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec.

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

An Executive Overview of GAPP. Generally Accepted Privacy Principles

Mitigating and managing cyber risk: ten issues to consider

HIPAA Compliance: Are you prepared for the new regulatory changes?

HEALTHCARE SECURITY AND PRIVACY CATALOG OF SERVICES

How To Buy Cyber Insurance

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

HIPAA Security Alert

Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable. Data Breaches Are All Too Common

FACT SHEET: Ransomware and HIPAA

Network Security & Privacy Landscape

Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:

Plan of Attack 5 Step Plan

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

What Data? I m A Trucking Company!

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

CYBER RISK SECURITY, NETWORK & PRIVACY

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT)

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

BUSINESS ASSOCIATE AGREEMENT

Cybersecurity Assessment

CYBER SECURITY SPECIALREPORT

Data security: A growing liability threat

Cyber/ Network Security. FINEX Global

Adding Cloud Solutions to Customer Contracts Robert J. Scott

HIPAA BUSINESS ASSOCIATE AGREEMENT

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Click to edit Master title style

Insurance for Data Breaches in the Hospitality Industry

HIPAA in the Cloud How to Effectively Collaborate with Cloud Providers

Department of Management Services. Request for Information

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Transcription:

Cybersecurity: Emerging Exposures for Technology Companies October 7, 2010

Your panelists David Allred, Head of the Technology Segment for North America Commercial at Zurich Liesyl Franz, Vice President for Information Security and Global Public Policy at TechAmerica October 7,2010 2

Overview of Today s Discussion Current laws and regulations: U.S. and international Emerging legislation and its potential impact Exposures to technology companies Risk management techniques to mitigate those exposures What to look for in choosing the right insurance coverage October 7,2010 3

Take action against the vendor Attorney Susan Lessack Hacked! Limiting employer liability for breached of employee data, Business Management Daily (businessmanagementdaily.com, Sept. 29, 2009

A Complex And More Demanding Regulatory Environment Industry-specific legislation 1996 Health Insurance Portability and Accountability Act (HIPAA) Health care providers 1999 Gramm-Leach-Bliley Act (GLBA) financial records/reporting State legislation breach reporting 2003 California Senate Bill 1386 (CA SB 1386) Subsequent state legislation (currently 44 states) Federal Trade Commission Red flag rule August 1, 2009 anyone who grants credit American Recovery and Reinvestment Act (ARRA) Includes Health Information Technology for Economic and Clinical Health Act (HITECH Act) - 2009 Broadens scope of HIPAA compliance to include more business associates Subtitle D addresses privacy and security concerns associated with the electronic transmission of information * www.itbusinessedge.com, Lora Bentley. April 3,2009 October 7,2010 5

Doing Business Outside U.S. Stringent privacy and data security laws Personal information cannot be collected without consumer permission, and consumers have the right to review the data and correct inaccuracies Companies that process data must register their activities with the government Employers cannot read workers private email Personal information cannot be shared by companies or across borders without the express permission from the subject of the data October 7,2010 6

Go Forward View: Emerging Laws and Regulations October 7,2010 7

Congress National Cybersecurity S. 3480 The Protecting Cyberspace as a National Asset Act (Sens. Lieberman/Collins/Carper) S. 773 The Cybersecurity Act (Sens. Rockefeller/Snowe) Regulatory Framework Designation of Covered Critical Infrastructure (and downstream implications for IT, Comms, and other providers) Identification and evaluation of cyber vulnerabilities to CCI and promulgation of regulations by DHS regarding security measures Direction and/or approval of emergency measures by DHS upon Presidential declaration of cyber emergency (with some liability protection) Annual certification of compliance Information sharing Study on global supply chain security with impact on Federal Acquisition Requirements October 7,2010 8

Congress Security and Data Breach H.R. 2221 The Data Accountability and Trust Act (Rep. Rush) S. 3742 Data Security and Breach Notification Act (Sen. Pryor) Regulatory framework: Conditions for notification of data breach by all organizations Pre-empts state laws Enforcement by Federal Trade Commission for unfair or deceptive acts; enforcement by State Attorneys General for harm to citizens Safe harbor from notification requirements for preventative security measures that render data unreadable, unusable, and indecipherable October 7,2010 9

Administration Activities National Strategy for Trusted Identities in Cyber Space (NSTIC) Global Supply Chain Security Department of Commerce Internet Task Force Privacy Cybersecurity Intellectual Property Protection National Institute for Standards and Technology FISMA compliance Risk management Smart Grid Department of Health and Human Services October 7,2010 10

Liabilities for Tech Companies October 7,2010 11

The Cybersecurity Landscape Who will be a target for lawsuits: software developers, system integrators, system outsourcing firms, data storage and retrieval companies, systems security developers, system security consultants and auditors Security and privacy risks go beyond data breaches: Industrial attacks, sabotage, corruption of a system or network Cloud computing is growing lower infrastructure costs real-time scalability for users results greater security risks Purchasers of technology products and services are increasingly seeking ways to contractually limit their liabilities and define technology vendors responsibilities for data breaches October 7,2010 12

Two Root Causes Of Breaches Technical Failure of firewalls Improper system setup and maintenance Password authentication protocol failure Hacking Lack of encryption Loss of paper files Human (social engineering) Poor passwords Failure to protect passwords Physical security of premises and equipment Failure to secure paper records Improper disposal of records Intentional acts October 7,2010 13

Potential Loss Scenarios Caused By Failure Of Your Product/Service Theft/misuse of customer personal information Transmission of malicious code Cost to remediate security vulnerability Cost to investigate event Liability to customers and other third parties Sabotage, defacement and vandalism Cost to remediate website and other content Hourly income while offline Liability to third parties for inappropriate content Denial of service attacks Lost income due to a network interruption Extra expense to restore the network Cost to remediate website and other content Online extortion Cost to remediate security vulnerability Cost to investigate event Extortion demand October 7,2010 14

Potential Indirect Loss Potential Of Breaches Reputational damage Crisis management costs to restore reputation Costs of notification Legal liability and breach mitigation costs October 7,2010 15

Take action against the vendor Attorney Susan Lessack Hacked! Limiting employer liability for breached of employee data, Business Management Daily (businessmanagementdaily.com, Sept. 29, 2009

Litigation: Real And Potential Lawsuit: Crawfish Town USA, et al v Computer World and Radiant Systems -- filed March 2009 in Lafayette, La Lawsuit: June, 2005, CardSystems Solutions - $16 million Other examples of vendors implicated in customer data breaches: Health Insurer, WellPoint claimed that a failed security update performed by a third-party vendor was responsible for a data breach Enterprise software solutions vendor HummingBird Ltd lost a piece of equipment belonging to Texas Guaranteed Student Loan Corp, containing unencrypted personal information An undisclosed number of Chase customers were sent notification letters after a vendor lost a tape containing sensitive information Hackers disabled an e-mail notification service, enabling them to transfer $465,000 from a business bank account. October 7,2010 17

Risk Management and Insurance October 7,2010 18

Risk Management: Looking Beyond Insurance Enterprise Risk Management (ERM) competitive, legal, financial, reputation C-suite support Brand protection Hiring practices Product/service implementation October 7,2010 19

Risk Management: Looking Beyond Insurance Security Designed into the product, not add-on Clear responsibility for security portion of product Formal product development process followed, including QA/QC documentation Contractual controls Clearly delineate responsibilities between developer, implementer and user Define checks on process with documentation Implementation Who does it vendor or client Clear instructions on implementation integration with other systems Configuration Migration of data from old system October 7,2010 20

Risk Management Looking Beyond Insurance If SAAS, Host, Cloud Network controls Storage and transmission of data Application and operating system backups Separation of data for customers virtual as well as physical Human controls Background checks (criminal, finance) Drug testing Social engineering training Use of passwords, storage practices, mobile Physical security Facility Data Data retention strategy October 7,2010 21

Insurance: What To Look For In Cyber Liability Coverage Does coverage respond to failure of your product/service as well as" loss of your data? Is a data breach event clearly defined? Does is cover loss of business information as well as personal information? Will it respond to a regulatory action as well as litigation by customers? Will it protect the company if the breach is caused by a rogue employee? Will it respond to an employee suit against the company (HR information)? How does it work in conjunction with your E & O and GL policies? October 7,2010 22

Questions and Answers David Allred david.allred@zurichna.com www.techinsurance.zurichna.com Liesyl Franz liesyl.franz@techamerica.org www.techamerica.org October 7,2010 23

Contact Information David Allred david.allred@zurichna.com www.techinsurance.zurichna.com Liesyl Franz liesyl.franz@techamerica.org www.techamerica.org October 7,2010 24

Zurich American Insurance Company. All rights reserved. The information in this presentation was compiled from sources believed to be reliable for informational purposes only. All sample policies and procedures herein should serve as a guideline, which you can use to create your own policies and procedures. We trust that you will customize these samples to reflect your own operations and believe that these samples may serve as a helpful platform for this endeavor. Any and all information contained herein is not intended to constitute legal advice and accordingly, you should consult with your own attorneys when developing programs and policies. We do not guarantee the accuracy of this information or any results and further assume no liability in connection with this publication and sample policies and procedures, including any information, methods or safety suggestions contained herein. Moreover, Zurich reminds you that this cannot be assumed to contain every acceptable safety and compliance procedure or that additional procedures might not be appropriate under the circumstances. The subject matter of this publication is not tied to any specific insurance product nor will adopting these policies and procedures ensure coverage under any insurance policy. October 7,2010 25