cyber invasions cyber risk insurance AFP Exchange



Similar documents
GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Cyber Insurance Presentation

Understanding Professional Liability Insurance

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised

ISO? ISO? ISO? LTD ISO?

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Joe A. Ramirez Catherine Crane

Cyber-Crime Protection

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

How To Cover A Data Breach In The European Market

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Cyber Liability & Data Breach Insurance Claims

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Cyber Threats: Exposures and Breach Costs

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?

Cyber-insurance: Understanding Your Risks

NZI LIABILITY CYBER. Are you protected?

Cyber Risk Insurance for Agents. Frequently Asked Questions

ANATOMY of a DATA BREACH DISASTER. Avoiding a Cyber Catastrophe. June, Sponsored by:

CYBER RISK SECURITY, NETWORK & PRIVACY

THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill

Insuring Innovation. CyberFirst Coverage for Technology Companies

Mitigating and managing cyber risk: ten issues to consider

DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET

Cyber/ Network Security. FINEX Global

DATA BREACH COVERAGE

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

Managing Cyber Risk through Insurance

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

Understanding the Business Risk

2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:

What would you do if your agency had a data breach?

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

An Introduction to Cyber Liability Insurance. Catherine Berry Senior Underwriter

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance

Cyber Liability & Data Breach Insurance Claims

Cyber Risks in Italian market

ACE Advantage PRIVACY & NETWORK SECURITY

Data Breach and Senior Living Communities May 29, 2015

Privacy / Network Security Liability Insurance Discussion. January 30, Kevin Violette RT ProExec

Network Security & Privacy Landscape

Cyber Liability & Data Breach Insurance Claims

Data security: A growing liability threat

Cyber and data Policy wording

Cyber Insurance as one element of the Cyber risk management strategy

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

PCI Compliance for Healthcare

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group Ext. 7029

Cyber Liability. What School Districts Need to Know

Embracing Cyber Risk: Insurance Solutions

Allianz Global Corporate & Specialty. Cyber Risks. Recent Trends. AIRMIC 15 th June 2015

Managing Cyber & Privacy Risks

Rogers Insurance Client Presentation

10 Smart Ideas for. Keeping Data Safe. From Hackers

Discussion on Network Security & Privacy Liability Exposures and Insurance

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

CSR Breach Reporting Service Frequently Asked Questions

I ve been breached! Now what?

Cyber and CGL Insurance Coverage for Data Breach Claims

CYBER SECURITY SPECIALREPORT

Transcription:

Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance to cover it. 42 I AFP Exchange April 2008

Gotcha Covered Cyber risk, a.k.a. network How to protect your company security liability, insurance with cyber risk insurance has been around for almost a decade. Yet it is still a relatively unknown and underutilized form of risk management. Mark Greisiger and Anne DeVries Many businesses think they are covered for cyber risk exposures with their current traditional property, commercial general liability, errors and omissions, fidelity/crime, and employment practices www.afponline.org AFP Exchange I 43

Cyber Risk liability coverage, but this is typically not the case. Most traditional insurance policies require direct physical loss or damage to tangible assets to trigger coverage. Courts, though, have held that electronic data is not considered tangible, and hacker damage or destruction of data is not construed to be physical in nature. Today, with network-centric operations the norm in most industries retail, medical, financial, legal, higher education some of a company s most critical assets are intangible: electronically stored information. In fact, a significant portion of any company s value is tied up in its electronic information assets as much as 70 percent in some cases according to Gartner, Inc., a preeminent technology research and advisory firm. Cyber risk insurance was developed to protect a company s intangible assets. It addresses the unique risk exposures associated with the electronic processes, interactions and digital assets arising from computer-dependent business activities. Almost every business, regardless of the product or service it provides, has some degree of cyber risk exposure, such as unauthorized access to data (from internal or external sources), computer viruses, denial-ofservice attacks and poor network management. Let s complicate the situation. Because identity theft is one of the fastest growing crimes, various privacy regulations (HIPAA, GLBA, FACTA, State Notice Laws) require that companies protect sensitive customer and employee data no matter where it resides: on the network, on standalone systems, such as billing, medical, and marketing databases; on remote devices, such as laptops; and on paper. At this point in time, 39 states have enacted legislation requiring companies to notify customers if they suspect there has been unauthorized access to their sensitive information. So in addition to the risk of lost business, companies now face a larger reputational risk and the potential for class-action lawsuits. Now things get really sticky. Recently passed regulations and industry standards, such as PCI DSS (Payment Card Industry Data Security Standards), add to a company s overall risk in the form of fines and penalties for noncompliance. The total cost in fines and penalties can be substantial, mounting into the millions of dollars. What s the worst that can happen? Even the most compliance- and security-focused company can be victimized by a data breach. Bigger often means more complex, with more moving parts and more inter-dependencies. The media underscores this point on a weekly basis, with large, well-managed and well-operated companies reporting breach events. Failure to take the necessary measures to secure information, and to mitigate potential loss if measures taken should fail, may result in significant financial costs for a business. When a cyber risk event occurs, the consequences can be financially crippling to a company with the emergence of class action lawsuits, huge forensic and mitigation costs, possible identity theft damage litigation and the potential loss of reputation and customers. The most damaging financial impact of these risks is most likely to come in the form of litigation. Several companies that have reported a major security breach are now facing privacy-related class action lawsuits that may require years of litigation and cost millions of dollars. But even when there is no lawsuit, there are extraordinary expenses involved. At least 39 states now require companies, by law, to notify every person whose personal identity information was compromised which can take weeks and a huge expenditure of manpower. Systems need to be shut down, business is interrupted, a public relations and damage control campaign needs to be launched, specialty investigation and forensic experts hired, and if it involved credit card information, cardholders, issuing banks and credit bureaus need to be notified. Information assets and records need to be restored. Consumer banks might seek reimbursement for credit card-related losses. Additionally, corporate officers can be held personally liable if they fail to provide adequate network security or act diligently to prevent breaches from occurring. What s the worst that can happen? Following are a few more examples of real losses experienced by real businesses: A large retailer was hacked by an outsider and over the course of a year the hacker stole more than 45 million credit card numbers and the personal identity information of more than 400,000 people. The company faced multiple class action suits on behalf of banks who suffered losses and on behalf of the individuals whose information was stolen. Potential liability is in the tens of millions of dollars. One of the nation s largest drug makers inadvertently divulged the e-mail addresses of 600 patients with various conditions in an e-mail to people who had signed up for Internet service reminders. The company was sued for invasion of privacy. Data leakage can impact any company. A hacker stole 350,000 credit card numbers from an online music retailer and posted thousands of them on a Web site when the retailer refused to pay ransom. Resulting costs included defense of privacy lawsuits, data restoration, public relations expenses and immeasurable costs in loss of customer confidence. The company never recovered and is now out of business. A disgruntled, terminated employee planted a logic bomb in the employer s system, destroying critical information, including backups. Total cost to the company exceeded $10M. 85 employees were laid off. 44 I AFP Exchange April 2008

According to Kevin Kalinich, managing partner of Professional Risk Solutions for the Aon Financial Services Group, The financial magnitude of such privacy and security breaches escalates the issue from risk managers to the CFO, GC and Board levels. Assessing your organization s risk To assess your organization s cyber risk and privacy exposure, ask yourself the following questions: What is the value of proprietary business information assets, and what would it cost to replace, restore or rebuild data records that are lost? What would be the impact on your revenue stream if either your online e-commerce transactions or billing systems were unavailable for hours, days or even weeks? What costs would you incur if you were required to notify hundreds of thousands of individuals whose personal information was inadvertently compromised from your system? What financial liability or reputation injury could you face if an employee inadvertently passed a virus or other malicious code on to business partners or customers? How well could you recover if a disgruntled employee sabotaged your system or sold proprietary business or customer information for personal gain? Kalinich recommends that companies use independent outside resources to assess their cyber and privacy risk. It s his belief that, A good third-party network risk assessment not only enables improved risk management and corporate governance compliance, it can also facilitate enhanced insurance coverage options at competitive pricing. Ceding a portion of your cyber risk Cyber risk exposure is divided into two degrees of risk: direct risks and indirect risks. Direct risks include the actual theft of customer information, trade secrets or money, damage to critical electronic data, and productivity losses that are real but may be difficult to quantify. Indirect risks are potentially more costly than direct risks and include loss of customers, damage to brand and loss of reputation. A comprehensive cyber risk insurance policy covers breaches caused by both internal and external factors, including employee errors in handling sensitive data. Cyber risk insurance is usually offered in modular form, so you can select the type and amount of coverage needed for your type of business. Available coverage includes: Business income loss including extra expense Data restoration expenses Public relations and consumer notification expenses Cyber extortion expenses Litigation and regulatory defense expenses While network security and privacy is still a relatively new area of coverage, the number of insurers offering this coverage has increased considerably in the past few years. There is now adequate capacity available for even the largest companies to obtain good protection against the financial and reputational crisis that could occur in the wake of a network security event. To obtain cyber risk insurance, your organization must meet baseline network security standards and demonstrate that it maintains a sound security posture. Insurers are looking for more than virus protection and intruder detection systems. Your organization must be able to show that its security posture focuses on three key areas: people, processes and technology. Insurance underwriters will want to know such things as: Do you have dedicated security personnel? Are their lines of report clearly delineated, all the way to the executive level of your organization? Is their incident escalation path defined? Are your security policies and procedures documented, maintained, and readily accessible to employees? Are all your employees trained in security procedures? Does your incident response plan include public relations? Are your notices already written and do you have a public relations or crisis communications firm under retainer? Obtaining an independent, enterprise-wide network security assessment that evaluates the people, processes and technology underlying your compliance and security posture is a good first step in both managing your risk and qualifying for cyber risk and privacy liability insurance. An objective, third-party assessment allows you to identify vulnerabilities, so you can harden security and reduce overall exposure. That s a win-win for your company and your insurer. As President of NetDiligence, Mark Greisiger is an authority on cyber security and network risk for computer-dependent businesses, government agencies and financial institutions. He is a graduate of Penn State University; Villanova University and Drexel University. Anne DeVries is the senior vice president for Digital Risk Managers, a division of Wells Fargo Insurance Services. With almost 20 years of experience in insurance underwriting for technology accounts, Anne teaches industry-related continuing education classes in Oregon and Washington. She holds a Bachelor of Science degree (Math/Computer Science) from Fairfield University in CT and a Master of Science degree (Computer Science) from Hofstra University in NY. www.afponline.org AFP Exchange I 45

Copyright 2008 by the Association for Financial Professionals (AFP). All Rights Reserved. This electronic document is designed to provide authoritative information in regard to the subject matter covered. It is not intended to offer accounting, legal or other professional advice. If accounting, legal, or other professional advice is required, or if expert assistance is needed, the services of a competent professional person should be sought. Reprinted from AFP Exchange, 2008. All inquiries should be addressed to: Communications Department Association for Financial Professionals 4520 East-West Highway, Suite 750 Bethesda, MD 20814 301.907.2862 Fax: 301.907.2864 E-mail: AFP@AFPonline.org Web: www.afponline.org 2008 by Association for Financial Professionals (AFP). All rights reserved.