How To Buy Cyber Insurance



Similar documents
Cyber Insurance: How to Investigate the Right Coverage for Your Company

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS Data Breach : The Emerging Threat to Healthcare Industry

Cyber Liability & Data Breach Insurance Claims

cyber invasions cyber risk insurance AFP Exchange

Preparing for the Inevitable Data Breach: What to Do Before Sensitive Customer and Employee Data is Breached, Stolen or Compromised

Managing Cyber & Privacy Risks

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

Privacy and Data Breach Protection Modular application form

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET

Network Security & Privacy Landscape

CYBER RISK SECURITY, NETWORK & PRIVACY

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Understanding the Business Risk

The Data Breach: How to stay defensible before, during and after the incident. Alex Ricardo, CIPP/US Breach Response Services

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Cyber Liability & Data Breach Insurance Claims

ACE Advantage PRIVACY & NETWORK SECURITY

Rogers Insurance Client Presentation

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

Beazley presentation master

Adventures in Insurance Land: Weaknesses in Risk Pricing & Alternatives

CAGNY Spring 2015 Meeting Fundamentals of Cyber Risk. Brad Gow June 9th, 2015 Endurance

Data Privacy & Security: Essential Questions Every Business Must Ask

Cyber/ Network Security. FINEX Global

T H E R E A L C O S T O F A D ATA B R E A C H

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

CYBER SECURITY SPECIALREPORT

Updates within Network Security and Privacy Risk Management

Data Breach and Senior Living Communities May 29, 2015

Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks

Attachment A. Identification of Risks/Cybersecurity Governance

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

The Data Breach: How to stay defensible before, during and after the incident. Alex Ricardo, CIPP/US Breach Response Services

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Cyber Liability & Data Breach Insurance Claims

Top Ten Technology Risks Facing Colleges and Universities

Cybercrime: risks, penalties and prevention

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance

Data Security Incident Response Plan. [Insert Organization Name]

Cyber-insurance: Understanding Your Risks

Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace

How To Cover A Data Breach In The European Market

PCI Compliance for Healthcare

Cyber Risks and Insurance Solutions Malaysia, November 2013

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage

plantemoran.com What School Personnel Administrators Need to know

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?

Strategic Plan On-Demand Services April 2, 2015

Enterprise PrivaProtector 9.0

Cyber Insurance as one element of the Cyber risk management strategy

Insurance implications for Cyber Threats

ISO? ISO? ISO? LTD ISO?

Cyber Threats: Exposures and Breach Costs

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA Toll Free: (877) IRON411

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

Technology, Privacy and Cyber Protection Modular application form

SECURITY. Risk & Compliance Services

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group Ext. 7029

CYBER AND PRIVACY INSURANCE: LOSS MITIGATION SERVICES

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP

Privacy / Network Security Liability Insurance Discussion. January 30, Kevin Violette RT ProExec

4/30/2015 CYBER LIABILITY AND AVIATION AGENDA LEARNING OBJECTIVES. Presented by Hal Hunt May 3, 2015

INFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE. I. GENERAL INFORMATION Full Name:

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Cyber Liability Insurance: It May Surprise You

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

Jefferson Glassie, FASAE Whiteford, Taylor & Preston

Privacy Insurance. Avoiding the HMO Experience. cyber. More Differences. By Toby Merrill

Cyber Liability Insurance Who Pays When Your Data Goes Missing?

NZI LIABILITY CYBER. Are you protected?

INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES

Anatomy of a Privacy and Data Breach

Cybersecurity Workshop

October 24, Mitigating Legal and Business Risks of Cyber Breaches

Managing Cyber Risk through Insurance

How To Protect Your Data From Being Hacked

THE DATA BREACH: How to stay defensible before, during and after the incident. after the incident.

Logging In: Auditing Cybersecurity in an Unsecure World

Cyber Liability. AlaHA Annual Meeting 2013

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

Cyber-Crime Protection

Cyber Insurance Presentation

Cybersecurity Best Practices in Mortgage Banking. Article by Jim Deitch October 2015

Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks

DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH

Transcription:

10-26-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO) and Privacy Officer 1

How to Investigate the Right Coverage How do you select an insurance broker? Questions to ask insurance brokers Process of purchasing cyber insurance How to evaluate your cyber insurance needs 2

Cyber Insurance Considerations How does the assessment portion of cyber insurance work? What are the questions to ask when looking at cyber insurance? Insurance Broker timeline: All the items we want to know about provided in interviews i of key stakeholders and then it may take up to two months to go through it. Have them provide a list of underwriters who will be presenting their cyber insurance coverage. 3

Selection of an Insurance Broker Some local Find the right Assessment Cyber insurance brokers still not mature enough to type of coverage for your company prior to obtaining Insurance Broker insurance analysis: what we need, why we know what cyber security is all about Who is the right Insurance Broker? need dit 4

Insurance Broker s View Used with Permission from IAPP Global Summit presenters: Toby Merrill, ACE Group Sarah Stephens, JLT Mark Greisiger, NetDiligence 5

Role of Insurance in Managing Cyber Risk Used with Permission from IAPP Global Summit presenters Toby Merrill, ACE Group, Sarah Stephens, JLT and Mark Greisiger, NetDiligence Most common policy triggers Industry 25% network security attack 15% rogue employee 20% lost or stolen device 9% privacy policy 16% human error 6% paper 31% healthcare 9% retail 13% technology 8% travel and hospitality 13% professional services 7% financial institutions Breakout Mitigate: Loss Mitigation Services - cyber and data privacy risk management portal e.g., NetDiligence s erisk Hub ; Remediate and patch exploits; IDS/IPS; dedicated security staff; network security assessment, phishing exercises Respond: Data Breach Team - independent Data Breach Team to respond to incidents Forensics Team preservation of evidence and aid investigation Legal Team to assist with notifications; Transfer: Risk Transfer Solutions - Financial Loss Protection including experienced claims staff to handle highly complex claims Insurance coverage for breaches - file lawsuits against third parties for recovery of claim 6

Insurance Broker Criteria Insurance Broker needs to understand cyber security needs Knowing what underwriters want is a valuable trait in an Insurance Broker Policy is meaningful and not just another insurance policy Present 3-4 underwriters who know your business and provide a quality cyber insurance policy Investigate having cyber insurance as part of the errors and omissions policy make sure human errors with technology is covered 7

Insurance Broker Criteria How do you evaluate the relative maturity of the Insurance Broker in selling cyber? Look for an Insurance Broker meet with risk team and advise them of our requirements What you are worried about making sure that we are giving full knowledge to the Insurance Broker of our security posture Insurance Broker would Insurance Broker wants Filling out application interview employees and tohelp epyouceatea create a (survey) would not show know what the profile and do a dress what our situation is. underwriters want to see rehearsal including an indepth report necessary Personal relationship is rather than just provide answers to a survey 8

Used with Permission i from IAPP Global Summit presenters: Toby Merrill, ACE Group Sarah Stephens, JLT Mark Greisiger, NetDiligence 9

Questions for Insurance Broker Tell me about the key things that will reduce our cost of What s hot right now in terms of what insurance What is the Broker s overall pitch to us? coverage the most? underwriters have an They should essentially Like to hear some interest? describe that they want to explanation about security controls and capabilities in response and not just scope reductions. Third party vendor management, protecting credits cards, point-of-sale, other? deeply understand our business and package our risk in a way that it can be sold to underwriters. Schedule a Meeting with Insurance Broker 10

Questions for Insurance Broker Explain a real case of yours when an insurance company pushed back on a claim and how you were able to advocate and fight for your client s position effectively? What types of considerations would we need to think about as we are examining the policies themselves? Potential ti expectations: ti discussions i regarding things like acts of God, accidental backdoors introduced by company s own developers, nation-state adversaries, terrorism, economic espionage, cases where company might have employed some form of active defense, etc. 11

Questions for Insurance Broker Do cyber security policies cover ransomware attacks? Does the Broker understand cyber security needs? What underwriters do you use? Do you know what the underwriters want to see with regard to our security posture? 12

Questions for Insurance Broker Explain the application do we fill it out with your help and at what point are we held accountable for the answers? Ask, how will the application be used? Would you simply use the application or would you interview employees? What is the relative maturity of the Broker in selling cyber insurance? 13

Questions for Insurance Broker How do you Consider having How much Quotes for determine what is reputational damage? coverage is enough? Brand coverage is the soft costs and premiums may go up. Have not done a good job quantifying yet. a line item in the cyber insurance policy for hiring a PR firm, forensics analysts, and attorneys to assist with a breach Cyber is so complex. It is tough to determine. Inventory number of records, PII, PFI, ephi data held various levels of coverage (i.e., $1M, $3M, $5M, up to $100M) 14

Sample of Possible Application Questions Reg8latory Which laws and/or standards apply to your business: PCI-DSS HIPAA GLBA DPPA (Driver s Privacy Protection Act) California s Privacy Law Red Flag Rules EU Data Directive Privacy Privacy Officer designated for company Privacy Policy Written and published Reviewed by an attorney Audited by external third party Secure data destruction policy/procedures in place Data retention policy for personally identifiable information (PII) Security Controls Chief Information Security Officer designated for company Information Security policies written and published Access controls restricted access to PII Incident Response Plan for network intrusions and viruses Penetration testing and audits performed Vulnerability scans, security appliances, IDS/IPS monitoring, DLP, etc. Physical controls Backup formats and secure storage r Damage and Hacke Business In nterruption Maintain redundant systems Speed of recovering and installing backups Description of website content t and social network posting control Processes for review of social media and website content Trademarks Copyright Disparagement Prior claims or loss from a breach 15

Cyber Insurance Coverages Network Security and Privacy Liability unauthorized access events Breach Response Services notification costs, credit monitoring, public relations expenses, forensic analysis, legal services, and call center services Regulatory Defense, Fines, and Penalties make sure this is included. Note: civil fines and penalties are not covered Transmission of Viruses/Malicious Code determine whether company would need this coverage Business Interruptions Expense costs to stand up business again (hardware, consulting services) Theft and Fraud destruction or theft of data and/or funds Digital Asset Coverage restore or recollect data lost of stolen PCI Fines and Penalties stolen credit card data and regulatory penalties Communications and Media Liability traditional and social media content, t website, trademarks, etc. Cyber Extortion payment and security consultant t fees 16

Cyber Insurance Premiums Climb Sharply Due to the number of data breaches, cyber insurance rates have increased substantially Retailers are seeing increases in premiums go up by 32% of what they were paying the previous year Some health insurance companies who have been breached are having a hard time renewing coverage Coverage for over $100 million is difficult to find Target s 2013 data breach cost $264 million and was paid out of pocket Insight - Cyber insurance premiums rocket after high-profile attacks by Jim 17 Finkle

Key Take Aways 1. Interview Insurance Brokers just because you have always used them for other insurance needs, does not mean you cannot seek one with cyber insurance expertise 3. Demonstrate your company is best in class. Build out incident response plan to include vendors and make improvements to security program prior to applying for cyber insurance. 5. Evaluate what your needs are and select the coverage that will protect your company the best 2. Setup an interview meeting with insurance broker. Prepare by developing questions you want to have them answer. 4. Complete the application with honest answers be prepared p to support your answers 6. Complete the purchase of cyber liability insurance and review the policy. Present this to the company s Board of Directors. 18

Resources For Research Purposes Only William C. Wagner, Esq. TftL Taft Law Firm Pi Privacy and Data Security Insight http://www.privacyanddatasecurityinsight.com/category/cybersecurity/breach-detection/ Cyber Insurance: Do I Really Need It? Cyber Insurance: What do Cyber Insurance Policies Cover and Cost? Cyber Insurance: How Do I Determine My Coverage Needs? Department of Homeland Security Cybersecurity Insurance Resource Page: http://www.dhs.gov/publication/cybersecurity-insurance UK Cyber Security The Role of Insurance in Managing And Mitigating the Risk https://www.gov.uk/government/uploads/system/uploads/attachment_dat a/file/415354/uk_cyber_security_report_final.pdf NetDiligence Cyber Risk Assessment and Data Breach Services http://www.netdiligence.com erisk Hub https://eriskhub.com 19

Thank You! Questions? 20

Further Questions? Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust CISO and Privacy Officer Email: Dr.FaithIG@gmail.com 21