NCBFAA Annual Conference 2015 Orlando Converging Logistics: Realities vs. Possibilities Cyber Insurance Bernie Cissek, Chairman.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Presented at: Ctuit Software and Lathrop & Gage LLP Food & Hospitality Roundtable San Francisco, CA April 29, 2013 Presented by: Leib Dodell, Esq.
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
© 2014 Nelson Brown Hamilton & Krekstein LLC. All Rights Reserved PRIVACY & DATA SECURITY: A LEGAL FRAMEWORK MOLLY LANG, PARTNER, NELSON BROWN & CO.
Cyber Insurance Today: Lots of Interest, Lots of Product Innovation, and Lots of Risk Richard S. Betterley, CMC Betterley Risk Consultants, Inc. Sterling,
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
Recent Trends and Insurance Considerations March 2015

BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
Why are Small and Mid-Size Companies Easy Targets for Hackers, and What can You do to Protect Yourself? 2/11/2015 Asher Dahan.
Overview of Cybercrime
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
AUGUST 25, 2015 Cyber Insurance:
Michael S. Williams 1. “Gentlemen don’t read each other’s mail.” - Henry L. Stimson 2.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Cyber Risk Insurance. Some Statistics Privacy Rights Clearinghouse o From 2005 – February 19, 2013 = 607,118,029 records reported breached. Ponemon Institute.
Cyber Security Nevada Businesses Overview June, 2014.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
David Barrett – Simmons & Simmons Stephen Wares – Hiscox Lisa Hansford-Smith - MARSH Products vs Services and what type of insurance solution is required.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
INTERNATIONAL RISK MANAGEMENT GROUP. ATTENTION TO DETAIL ~ ATTENTION TO YOU At International Risk Management Group (IRMG), we have the experience, knowledge.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Matt Foushee University of Tulsa Tulsa, Oklahoma Cyber Insurance Matt Foushee University of Tulsa Tulsa, Oklahoma.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
A PM’s Guide to Surviving A Data Breach. Compliance: PCI QSA and PCI Gap Analysis FISMA HIPAA SSAE 16 GLBA, Red Flags Response Incident Response and Disaster.
New A.M. Best Cyber Questionnaire
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
15 years of Web Security © 2015 WhiteHat Security, Inc. Jeremiah Grossman Founder WhiteHat Security, Inc. The Rebellious Teenage Years.
1 Privacy Lessons from Other Industries Chris Zoladz, CIPP, Vice President, Information Protection Marriott International, President, International Association.
CYBER SECURITY & ITS IMPACT ON FINANCIAL STATEMENTS AUDITS BOB WAGNER TUESDAY, NOVEMBER FLORIDA SCHOOL FINANCE OFFICERS ASSOCIATION CONFERENCE.
Being there When you need us Thats our policy. Cyber Awareness – what can be done?
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Welcome to the ICT Department Unit 3_5 Security Policies.
Cyber Risk Management and Insurance
Information Security and Privacy in HRIS
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Cyber Insurance - Risk Exposures and Strategic Solutions
Cyber Liability Insurance for an unsecure world
Cyber Insurance Risk Transfer Alternatives
Clients and Prospective Clients on the Threat of Cyber Crime
Breaking Down Cyber Liability
Hot Topics in the Financial Industry: Cybersecurity
New A.M. Best Cyber Questionnaire
Financial Institutions – Cyber Risk
E&O Risk Management: Meeting the Challenge of Change
Insurance Technology Forums: ‘IT Matters’ Forum
Managing a Cyber Event Steven P. Gibson President
Cyber Insurance – FFs & CHBs
Data protection headaches: GDPR, brexit AND perimeter risk
Forensics Week 11.
Cyber Insurance Overview
Chapter 3: IRS and FTC Data Security Rules
Cyber Insurance: An Update on the Market’s Hottest Product
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Society of Risk Management Consultants Annual Conference
Andy Hall – Cyber & Tech INSURANCE Specialist
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
FAIR 2018 – Cyber Risks & Markets
By Joseph Carnevale, CIP Partner & Director of Sales
Cyber Security: What the Head & Board Need to Know
Presentation transcript:

NCBFAA Annual Conference 2015 Orlando Converging Logistics: Realities vs. Possibilities Cyber Insurance Bernie Cissek, Chairman

Eagle Underwriting Group Inc. 2 Brief History: First “internet liability” policy written 1997 due to fears of Y2K Dot com bubble accelerates growth ( ) but take-up is limited to network reliant business First mandatory breach notification laws passed in California in 2003 (CA1386) Uptake in this insurance slow since 2003 but now gaining traction we are at the precipice it has hit the news on a regular basis

Eagle Underwriting Group Inc. Eagle Underwriting I have been involved in underwriting and insuring risks for the Customs Brokering and Logistics Industry since the 80’s and developed new insurance products as the industry grew and progressed. We now have available a stand alone Cyber Crime and Cyber Privacy Insurance Policy, which if needed can also be part of the Legal liability and E & O Package. 3

Eagle Underwriting Group Inc. 4 Types of Coverages The Coverage is Both a Service and Insurance Policy will offer both First and Third Party Coverage First Party Coverage includes: Business InterruptionCyber Extortion Cost of restoring dataForensic Investing Costs Notification ExpensesCredit monitoring Expenses Crisis Management & associated PR Costs

Eagle Underwriting Group Inc. 5 Types of Coverages (Continued) Third Party Coverage includes Defense expenses and Indemnity payments as a result of a network breach Includes regulatory investigation costs and associated fines/ penalties (where insurable)

Eagle Underwriting Group Inc. Protect and Insure Your Critical Data This “critical data” can range from client corporate information e.g an from the CEO regarding a possible merger, or a customer’s information e.g name, address, banking info, social security number, importer information, address, export documents, bond and clearance information etc. Basically any information which is in your care, custody or control should be protected. This critical/ sensitive information doesn’t just mean information you store on a computer network. What companies need to ask is, what would cause the most damage if it was lost and how is this being monitored and protected? Do you know your weak spots? Are staff trained? Is there a clear understanding of what to do if your company has a breach – has this been tested? As with all insurances, cyber insurance is a last resort. It is there to provide protection in the event that you have a breach, even if you have done your upmost to protect your company’s critical data. You will have cyber-experts to call. We will “triage” the situation for you. 6

Eagle Underwriting Group Inc. Emerging Trends Bring Your own device, BYOD your employees have access to your system with “their” device. The next greatest security breaches we could have is through the iPhone/iPad the system too wide open. (James Comey) Reliance on the “Cloud” and other third party vendors. Do you know where your data resides, and under which country’s laws, what does the small print say about the vendors responsibility to you. Next generation products will cross bounderies that will be even less controllable It’s 2:00 PM do you know where your data is or who now controls it. 7

Eagle Underwriting Group Inc. Conclusion We are in an age of information technology that has matured to run virtually every company or industry on earth including our personal lives. The bad guys and girls including some state sponsored hackers are out to get your data and sell it or hold it for ransom or close down your systems and your company. As in the past when we in the insurance industry made Legal liability and E & O Insurance available to protect the Customs Brokers and Freight Forwarding Industry we now have a “bespoke” stand alone Cyber- Protection Package We have applications available and further information you can get from Jason Wieselman, of International Bond & Marine or the web site. Thank you for your attention 8

Eagle Underwriting Group Inc. You have been HACKED 9

Eagle Underwriting Group Inc. The Policy your protection 10