Network Security & Privacy Landscape



Similar documents
The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013

Privacy Rights Clearing House

Data Breach and Senior Living Communities May 29, 2015

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

Managing Cyber & Privacy Risks

PCI Compliance. Top 10 Questions & Answers

PCI Compliance for Healthcare

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group Ext. 7029

Accepting Payment Cards and ecommerce Payments

PCI: The Dark Side. May 2012 Roanoke, VA

SecurityMetrics. PCI Starter Kit

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

How-To Guide: Cyber Security. Content Provided by

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

Cyber Risks and Insurance Solutions Malaysia, November 2013

PCI Compliance Top 10 Questions and Answers

Updates within Network Security and Privacy Risk Management

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

How To Protect Yourself From Cyber Threats

Data security: A growing liability threat

Data Security & PCI Compliance & PCI Compliance Securing Your Contact Center Securing Your Contact Session Name :

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )

PCI Data Security Standards

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009

POLICY & PROCEDURE DOCUMENT NUMBER: DIVISION: Finance & Administration. TITLE: Policy & Procedures for Credit Card Merchants

Cyber and Data Security Risks

White Paper September 2013 By Peer1 and CompliancePoint PCI DSS Compliance Clarity Out of Complexity

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

PCI Compliance Overview

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

Privacy / Network Security Liability Insurance Discussion. January 30, Kevin Violette RT ProExec

I ve been breached! Now what?

Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable. Data Breaches Are All Too Common

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

How To Protect Your Business From A Hacker Attack

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

Frequently Asked Questions

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

Payment Card Industry Data Security Standard

Data Security for the Hospitality

Law Firm Cyber Security & Compliance Risks

Cyber Security An Exercise in Predicting the Future

Protecting personally identifiable information: What data is at risk and what you can do about it

White Paper: Are there Payment Threats Lurking in Your Hospital?

Information Technology

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS

Top Ten Technology Risks Facing Colleges and Universities

Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com

Cyber-insurance: Understanding Your Risks

INFORMATION SECURITY FOR YOUR AGENCY

Attachment A. Identification of Risks/Cybersecurity Governance

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

PAI Secure Program Guide

Project Title slide Project: PCI. Are You At Risk?

Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

Payment Card Industry - Achieving PCI Compliance Steps Steps

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

Sales Rep Frequently Asked Questions

WHITE PAPER. PCI Basics: What it Takes to Be Compliant

Transcription:

Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1

Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies Security & Privacy Coverage - Coverage Parts - Gaps in Traditional Coverage - Pre-Breach & Risk Management Approach Chartis Inc. All rights reserved. 2

Data Security Not Just an IT Problem Information security viewed as an IT Problem vs. Enterprisewide risk management issue - Misconception that IT alone can safeguard the organization - Failure to address the human element and not just the technology Negligence is the leading cause of a data breach, at 41% of all reported cases Sources: Ponemon Institute Cost of a Data Breach Report 2010 & Verizon Business 2011 Data Breach Investigations Report 3

Some Quick Stats $214 per record is the average cost of a data breach, with an average total per-incident cost of $7.2 million in 2011 96% of breaches could have been avoided if reasonable data security controls had been in place at the time of incident - 85% of hacking cases have had a patch available to fix the vulnerability for 18+ months 86% of Clients identify cyber insurance as their top concern Sources: Carnegie Mellon Governance of Enterprise Security: CyLab 2010 Report, Ponemon Institute Cost of a Data Breach Report 2010, NetReaction, LLC, October 2012 AIG Study of 250 brokers & clients 4

What Can Cause a Breach Storage of prohibited / unnecessary data (magnetic stripe, secret PIN, old data) Malware impacting computer systems Employee / Contractor privileged access misuse Vendor default settings and passwords Physical security breach Phishing, Spear Phishing, Vishing, etc. 5

Regulatory Environment Increased industry, regulatory and legislative focus on security due to high profile data compromises - Massachusetts 201 CMR 17 + State Notification Laws - Payment Card Industry Data Security Standards (PCI DSS) - Revised Health Insurance Portability and Accountability Act (HIPAA) HITECH act for Protected Health Information (PHI) to include business associates doing business with healthcare organizations - Red Flag Rules imposed by Federal Trade Commission 6

State Notification Laws Only 4 states do not have notification provisions: Alabama, Kentucky, New Mexico and South Dakota Most states define a breach as unauthorized access to unencrypted, computerized personal information which varies by state Massachusetts law criminalizing data breaches Coverage pitfall of where required by law language or limited definition of confidential information Source: NCSL State Security Breach Notification Laws; http://www.ncsl.org 7

PCI-DSS (Payment Card Industry Data Security Standard) Pressure to enforce tighter standards due to recent breaches - Payment processors are held to higher standards by VISA, MasterCard - Estimated that less than 10% of Level 4 merchants are compliant Level / Tier 1 2 3 4 Merchant Criteria Any merchant processing over 6M transactions Any merchant processing 1M to 6M transactions Any merchant processing 20,000 to 1M e-commerce transactions Any merchant processing less than 1 million transactions (20,000 e-commerce) Validation Requirements Annual report on Compliance Quarterly scan by ASV Annual self assessment Quarterly scan by ASV Annual Self-assessment Quarterly scan by ASV Recommended self-assessment Scan requirement set by acquirer 8

HIPAA & The FTC Red Flag Rules HITECH act altered HIPAA - Privacy and Security rules implemented under HIPAA to cover business associates (legal, accounting, claim, data aggregation, finance, benefits management) - A business associate is someone on behalf of a covered entity, performs activity involving Protected Healthcare Information (PHI) Red Flags & the FTC: - FTC requires a financial institution or creditor to protect against identity theft by implementing policies and procedures to detect suspicious activity - Red Flag is a pattern, practice or specific account activity that indicates possibility of Identity theft on covered account 9

Case Study Hacking The Incident: An online gaming company s POS software was hacked and credit card information was obtained on roughly 12,500 individuals. The intruders were able to steal information from approximately a month before the breach was discovered. How to Apply This to You: 1. No such thing as impenetrable IT systems 2. Often times you don t even know you ve been hacked 3. What is your response plan? Who is your first call? Source: http://privacyrights.org/data-breach/new 10

Case Study Employee Negligence The Incidents: 1. An employee of an HR consulting firm accidentally posted personal information of nearly 400 current and former client s employees. Names and social security numbers were disclosed. 2. Approximately 2,000 patient records including names, Social Security numbers, addresses and more were found in a trash can. They were traced to medical case manager. The boxes were auctioned off after the owner failed to pay the rental fee on a storage unit. How to Apply This to You: 1. Employee training matters CyberEdge Risk Tool can help 2. Monitor employee access to sensitive data Source: http://privacyrights.org/data-breach/new 11

Case Study Stolen Portable Media The Incident: A laptop was stolen from health and human services company with over 2,000 people s confidential data on it. Two men distracted the receptionist, while a third stole the laptop from down the hallway. Names, dates of birth, medical records, insurance numbers and Medicaid numbers were disclosed. How to Apply This to You: 1. Physical controls & employee training 2. Remote wipe capabilities 2. Encryption (whole disk) for sensitive data on portable media Source: http://privacyrights.org/data-breach/new 12

Case Study Rogue Employee The Incidents: 1. A rogue employee at medical center was accessing and stealing patient information including names, Social Security numbers, address, dates of birth, driver s license numbers, health insurance cards and other information. Around 500 people were affected. 2. A retail cashier used a skimming device to steal credit card information and selling them to a third party. Only 50 numbers were stolen, which amounted to $181,000 in fraudulent purchases. How to Apply This to You: 1. Rogue employees can circumvent your IT security 2. Large black market for personal information with growing connection to organized crime Source: http://privacyrights.org/data-breach/new 13

Case Study Mailing / Vendor Error The Incident: A mailing error at the state Treasurer's Office led to the social security numbers of over 36,000 people to be visible from the outside of envelopes mailed to the public. The sensitive data was printed on the wrong part of the letter. How to Apply This to You: 1. Know your vendors and your responsibilities in the event of a loss 2. Contractual indemnity language is important Source: http://privacyrights.org/data-breach/new 14

Cost Variation- Dependent on Vendor Selection Healthcare breach of approx 50,000 records, including social security numbers Two years of credit monitoring services provided to victims Insured's Vendor Cost AIG Preferred Vendor Cost Savings Legal Assistance with Notification Letters $24,190 $10,000 $14,190 Print/Mail Letters $63,551 $56,341 $7,209 Call Center Services $118,642 $66,852 $51,790 Identity Monitoring Services $683,996 $317,297 $336,698 Totals $885,379 $450,490 $439,888 15

What are the Consequences of a Breach? Breach Notification Costs - Average industry consumer notification cost approx $12 per person Identity Monitoring - Estimated approx $40 per person per year Regulatory Actions - Always changing - Costs to defend and fines/penalties Lawsuits & Defense Cost - Liability for damages - Costs of defense are rising Unbudgeted Expenses - Lost man hours and resources Reputational Damage - Lost customers/revenues 66% of financial impact on a company Source: Ponemon Institute Cost of a Data Breach Report 2010 16

Security & Privacy Insurance Security and Privacy Liability (3 rd party requires a demand/litigation) - A successful computer attack against an insured that causes harm to a third party - A wrongful disclosure or breach of private/confidential data Event Management (1 st party no demand/litigation required) - Notification costs (including legal assistance) - Identity Monitoring/Consumer ID Protection - Forensic investigation - Public relations to restore the insured's reputation - Call center services Other Coverages Media, Network Interruption, Extortion 17

Risk Management Tools: The AIG Difference Autoshun Device - Hardware device placed between network & internet to shun bad IP addresses CyberEdge Risk Tool - Web portal to manage training, compliance and regulatory risk management AIG CyberEdge App - AIG claims narratives, hot spot map of recent breaches, breach calculator, industry news 18

Questions and Answers Greg Garijanian (770) 671-2366 Greg.Garijanian@AIG.com www.aig.com/us/cyberedge 19