Privacy Liability & Data Breach Management Cyber Insurance as a Customer Privacy Protection Tool



Similar documents
Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Privacy Liability & Data Breach Management Nikos Georgopoulos 1 st Athens Privacy & Data Breach Management Conference

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

Is Cyber Insurance the Next Big Think? 2nd Digital Payments Summit - May Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

How To Cover A Data Breach In The European Market

Security and Privacy

The impact of the personal data security breach notification law

Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Is Your Financial Institutions' Insurance Policy vulnerable to a cyber claim? Joan D Ambrosio, James Cooper and Kim West 22 January 2014

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

KEY STEPS FOLLOWING A DATA BREACH

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

2012 NCSA / Symantec. National Small Business Study

LIGC-ACC Presentation November 9, 2015

4 Steps to Better Security In The BYOD Era For Your Company.

Privacy Rights Clearing House

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

2015 CENTRI Data Breach Report:

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO

Data Breaches and Cyber Risks

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Top Ten Technology Risks Facing Colleges and Universities

Network Security & Privacy Landscape

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

What Data? I m A Trucking Company!

Logging In: Auditing Cybersecurity in an Unsecure World

Small businesses: What you need to know about cyber security

I ve been breached! Now what?

Cyber Security. John Leek Chief Strategist

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Cyber Risk in Healthcare AOHC, 3 June 2015

Small businesses: What you need to know about cyber security

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device OR Bring Your Own Drinks?

Bring Your Own Device (BYOD) and Mobile Device Management.

Data Breach and Senior Living Communities May 29, 2015

INFORMATION SECURITY FOR YOUR AGENCY

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Network Security & Privacy Landscape

Data Breach Notification Duty. Dr. Elisabeth Thole 31 October 2015 UIA Valencia

2012 Bit9 Cyber Security Research Report

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name

THE DATA BREACH: How to stay defensible before, during and after the incident. after the incident.

CyberEdge Insurance Proposal Form

Internet threats: steps to security for your small business

Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows

HIPAA Compliance: Efficient Tools to Follow the Rules

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

New challenges in Data privacy.

Senaca Shield Presents 10 Top Tip For Small Business Cyber Security

Identity Theft Security and Compliance: Issues for Business

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group Ext. 7029

Beazley Group Beazley Breach Response. A data breach isn t always a disaster Mishandling it is.

Protecting What Matters Most. Terry Ray Chief Product Strategist Trending Technologies Session 11

Highlights of PHI/PI Security Requirements

Practical Cyber Law: Why the Standard of Care Requires Lawyers to Have a Basic Understanding of Cyber Insurance

The Department of Health and Human Services Privacy Awareness Training. Fiscal Year 2015

EU Regulatory Trends in Data Protection & Cybersecurity What should be on the industry s agenda?

ACE Advantage PRIVACY & NETWORK SECURITY

2012 NCSA / McAfee Online Safety Survey

Common Data Breach Threats Facing Financial Institutions

Computer Security at Columbia College. Barak Zahavy April 2010

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Management and Storage of Sensitive Information UH Information Security Team (InfoSec)

Bring Your Own Device (BYOD) and Mobile Device Management

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

Cyber Liability. What School Districts Need to Know

Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com

ACE European Risk Briefing 2012

Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

CYBER-LIABILITY COVERAGE: The $ 45 Million Dollar Exposure

Legal Grand Rounds Update on Privacy and Security Laws with Best Practices Carol Romej, J.D., LL.M. August 26, 2015

2012 NORTON CYBERCRIME REPORT

BRING YOUR OWN DEVICE. Protecting yourself when employees use their own devices for business

Hot Topics in IT Security PREP#28 May 1, David Woska, Ph.D. OCIO Security

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

Think STRENGTH. Think Chubb. Cyber Insurance. Andrew Taylor. Asia Pacific Zone Product Manager Chubb Pro PI, Media, Cyber

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

REDEFINING THE BOUNDARIES OF RISK MANAGEMENT, NOW AND INTO THE FUTURE

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

NZI LIABILITY CYBER. Are you protected?

A 5-STEP PLAN TO PREPARE FOR HEALTHCARE. A Complimentary White Paper from

Why Encryption is Essential to the Safety of Your Business

April Cyber risks: Understanding your insurance protection

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

Certified Secure Computer User

National Cyber Security Month 2015: Daily Security Awareness Tips

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

How to Practice Safely in an era of Cybercrime and Privacy Fears

Cyber/ Network Security. FINEX Global

Transcription:

Privacy Liability & Data Breach Management Cyber Insurance as a Customer Privacy Protection Tool Nikos Georgopoulos Cyber Risks Advisor - cyrm Nikos Georgopoulos Microsoft Insurance Conference March 2015 1

Data Everywhere Nikos Georgopoulos Microsoft Insurance Conference March 2015 2

The Market of Stolen Personal Information Credit card information (name, billing address, card-number, CVV2 code, and expiration date) = $1.50 $3.00 per file. Social security numbers = $1 $6 per number, depending on availability of corresponding date of birth and/or mother's maiden name. Online banking log-in details = $50 $1,000. See, RSA Anti-Fraud Command Center, RSA Online Fraud Report, August 20010: ww.rsa.com/solutions/consumer_authentication/intelreport/11068_online_fraud_report_0810.pdf Nikos Georgopoulos Microsoft Insurance Conference March 2015 3

Nikos Georgopoulos Microsoft Insurance Conference March 2015 4

Nikos Georgopoulos Microsoft Insurance Conference March 2015 5

How Do Data Breaches Occur? Employee loses an unencrypted portable device (smartphones, laptop, thumb drive, backup tape) Property crimes (computers prime targets) Inside job (employee steals information) Stray faxes, emails Phishing scams and increasingly, Social Engineering Malware / virus attacks (especially when working remotely on an unsecured network) Failure to purge/scrub computing devices scheduled for destruction Nikos Georgopoulos Microsoft Insurance Conference March 2015 6

The Average per Capita Cost of Data Breach 2014 Cost of Data Breach Study global Ponemon Institute Research Report Nikos Georgopoulos Microsoft Insurance Conference March 2015 7

The Average per Capita Cost of Data Breach per Industry 2014 Cost of Data Breach Study global Ponemon Institute Research Report Nikos Georgopoulos Microsoft Insurance Conference March 2015 8

Greek Market Vs Global Market Security Incidents PWC Information Security Survey 2013 70% 60% 50% 40% 30% 20% 10% 0% Eurozone China Germany Greece Italy Spain UK None 1or 2 over 3 N/A Greek companies do not report Security Incidents Nikos Georgopoulos Microsoft Insurance Conference March 2015 9

World's Biggest Data Breaches Nikos Georgopoulos Microsoft Insurance Conference March 2015 10

Directive On Network and Information Security The Commission extends the obligation to report significant cyber incidents except Internet and Telecommunications providers to: Key Internet companies (e.g. large cloud providers, social networks, e-commerce platforms, search engines). Banking sector, Stock Exchange, Insurance Industry Energy (e.g. electricity and gas) Transport (operators of air, rail and maritime transport and logistics) Health Obligation to notify Customers Breach notification within 24 hours to the local regulator Data Protection Officers for 250+ employee firms Fine: up to 100m or 5% of global annual turnover Nikos Georgopoulos Microsoft Insurance Conference March 2015 11

Manage Your Risk Reduce Cyber Risks Incident Handling Team Personnel Education Procedures & Policies Data Encryption BYOD managed policy Information Security Partners Transfer Buy Cyber Insurance for Residual Risk Nikos Georgopoulos Microsoft Insurance Conference March 2015 12

Risk Management Issues Privacy (Cyber) Insurance Insure Intangible Assets http://www.youtube.com/watch?v=4cn5dwpkyla Nikos Georgopoulos Microsoft Insurance Conference March 2015 13

Data Breach Reactive Management Nikos Georgopoulos Microsoft Insurance Conference March 2015 14

Cyber Attacks Financial Impact Nikos Georgopoulos Microsoft Insurance Conference March 2015 15

Cyber Risks Advisors m.privacyrisksadvisors.com Nikos Georgopoulos Microsoft Insurance Conference March 2015 16

More Information Nikos Georgopoulos Cyber Risks Advisor TEL. 6948 365033 Email: nikos.georgopoulos@cromar.gr CROMAR Insurance Brokers LTD, LLOYD's Coverholder Athens, Ag. Konstantinou 17 & Ag. Anargiron - 151 24 Marousi Τ: +30 210 80 28 946-7, F: +30 210 80 29 055 Thessaloniki, Politechniou 24 546 25, T: +30 2310 50 2506, F: +30 2310 52 6028 http://www.cromar.gr Diversified Experience in Insurance, Asset Management and Banking 21 years experience in Financial Sector 8 years in Insurance: Alternative Channels Sales Manager Generali Hellas 5 years in Asset Management: Marketing Director ALPHA TRUST Asset Management Company 5 years in Banking: XIOSBANK Εducation ALBA Professional MBA BS Physics University of Patras Certifications Certified Insurance Advisor Cyber Insurance Risk Manager Nikos Georgopoulos Microsoft Insurance Conference March 2015 17