Cyber Summit 2016 Data Bytes and Frights Presented by: President and CEO Peter J. Elliott, CPCU.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Red Flag Rules: What they are? & What you need to do
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
Best Practices for Insuring Medical Practices from Cyber Risk.
Basics of Liability Liability Issues and Coverage.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Overview of Identity Theft, Data Breaches and Cyber/Privacy Liability Insurance October 6, 2009.
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
Recent Trends and Insurance Considerations March 2015
© Chery F. Kendrick & Kendrick Technical Services.
Peter Brudenall & Caroline Evans- Simmons & Simmons Marsh Technology Conference 2005 Zurich, Switzerland. Managing the Security Landscape – Legal and Risk.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Risk Management Overview with Meg Tully, CAE Meg Tully, CAE Association Development Director.
NEFEC - Cyber Liability MICHAEL GUZMAN, ARM ARTHUR J. GALLAGHER & CO.
Overview of Cybercrime
2015 ANNUAL TRAINING By: Denise Goff
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Identity Protection (Red Flag/PCI Compliance/SSN Remediation) SACUBO Fall Workshop Savannah, GA November 3, 2009.
AUGUST 25, 2015 Cyber Insurance:
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Cyber Risk Insurance. Some Statistics Privacy Rights Clearinghouse o From 2005 – February 19, 2013 = 607,118,029 records reported breached. Ponemon Institute.
Protecting Your Organization Identity Theft and Data Breach.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Prepared by Dept. of Information Technology & Telecommunications, November 19, 2015 Application Security Business Risk and Data Protection Gregory Neuhaus.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Matt Foushee University of Tulsa Tulsa, Oklahoma Cyber Insurance Matt Foushee University of Tulsa Tulsa, Oklahoma.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
1 CONFIDENTIAL ©2015 AIR WORLDWIDE New Approaches for Managing Cyber Risk.
Managing Your Cyber/E&O Risk with Willis FINEX Robert Barberi, Vice President, Willis Cyber Practice.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
NCBFAA Annual Conference 2015 Orlando Converging Logistics: Realities vs. Possibilities Cyber Insurance Bernie Cissek, Chairman.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
What lessons can we learn from other data breaches? Target Sentry Insurance Dynacare Laboratories 1 INTRODUCTION.
Data Security Survival Skills for 21 st Century Evaluators Teresa Doksum & Sean Owen October 17, 2013.
Being there When you need us Thats our policy. Cyber Awareness – what can be done?
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber Liability: New Exposures Presented by: Henriott Group © 2007, , Zywave Inc. All rights reserved.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Cyber Liability Insurance for an unsecure world
Financial Institutions – Cyber Risk
E&O Risk Management: Meeting the Challenge of Change
John A. Wright, CEO WIPFLI Client Appreciation June 8, 2017
Managing a Cyber Event Steven P. Gibson President
Cyber Insurance Overview
Chapter 3: IRS and FTC Data Security Rules
Society of Risk Management Consultants Annual Conference
Cyber Issues Facing Medical Practice Managers
Red Flags Rule An Introduction County College of Morris
Cyber Trends and Market Update
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Cyber Exposures The Importance of Risk Identification and Transfer
Forensic and Investigative Accounting
Cyber Security: What the Head & Board Need to Know
Presentation transcript:

Cyber Summit 2016 Data Bytes and Frights Presented by: President and CEO Peter J. Elliott, CPCU

“You have to learn the rules of the game. And then you have to play better than anyone else.” -Albert Einstein

Data Breach Trends Drawing Attention 2014 Record High for Breaches Records Exposed- 176 Million The Average Cost of a Stolen Record-$200+ The average total cost of a single data breach rose 23% to $3.79 million Moody’s Considers Cyber Exposure a Stress Factor

Claim Example from the News November $8.22 per record a bargain from Target 40 Million Credit Cards Compromised Direct Cost $290 Million with $90 Million Paid by Insurance New Settlement Indirect Cost of $39 Million with Banks and Credit Unions

Breaches? Yes! Employee steals 100 files with customer data Hacker releases 2,400 members information as a protest Laptop stolen with 97,000 data records Coding error leads to 2,950 medical forms mailed to the wrong addresses.

Anatomy of a Breach Incident: Malicious attack, employee error, or theft are the most common Discovery: Victims are typically the last ones to know. Usually discovered within months. Forensics Analysis: What, Where, and How. Response: Compliance to regulatory requirements for notification. Damage Control: Offering credit monitoring/fraud monitoring to the impacted parties. Possible Lawsuits from victims and fines/penalties from regulatory agencies.

Data Liability Key Term Defined: li·a·bil·i·ty, noun: …the state of being responsible for something, especially by law

Data Breach State Notification Laws: In 47 states (all but AL, NM, SD) Subject to statutory fines and penalties—more than just CPNI, but that is a good example HIPAA/HITECH Laws: (health care rules-includes personal insurance/GHP information) For entities that keep patient health info or do data-back up which contains HIPPA protected information Enforced by Dept. of Health & Human Services

Red Flags Rule: Requires Identity theft protection programs or be subject to fines/penalties Applies to most businesses-Utilities specifically named as an example (requires CPNI/Red Flags training of employees and reporting to the Board Annually)

Who is Held Accountable? Management is responsible for implementation of data breach process, procedures, and employee training. The Board is responsible (remember for CPNI/Red Flags, the Board must be given a report each year and it must be part of the Board minutes) Example Palkon v Holmes: The Board of Wyndham hotels was sued because they had several cyber attacks and the allegation was that they had not done enough to prevent them from re-occurring after the 1 st one

Eliminate or Avoid Minimize Transfer to a 3 rd Party Retain Management of Risk

Physical Controls Locked Doors Alarms Surveillance Biometrics-fingerprint recognition or eye recognition to enter the area where data is stored Badges Guests sign-in and are escorted throughout the building Turn CSR’s monitors so that others can not see that data on them while they wait in line or go through the drive-through Minimize Risk

Cyber Controls Restores operational functionality as soon as possible Focuses on ability to preserve and sustain its operations in the event of a cyber-related loss Address the effects on customers Public relations component (reputation, customer relationship preservation) Monitoring the cyber risk security plan and ensuring compliance Continually evaluate and revise its risk control measures Minimize Risk

Insurance: Obtaining a cyber risk insurance policy –pretty inexpensive and thorough Contracts: Contractual requirements with 3 rd parties (Hold Harmless Agreements) -Are they accepting liability or transferring that back to you ? -Do you have the proper insurance requirements for your vendors whom you share your data with ? -Data centers/cloud providers - do you accept liability in the service agreements? -Who is responsible if the data center has a breach and your customers’ customer’s data is breached? -Does your customer even know their data is shared with a data center or will they blame you? Transfer of Risk

Insurance Policy Website publishing/Media Liability – “wrongful acts” posted on insured website, like copyright infringement Security Breach-costs to notify affected individuals, call-center for ?s, and credit monitoring Replacement/restoration of electronic data – replace/restore data or programs damaged form an E-commerce incident Extortion threats-reimbursement/ransom payments from direct cyber extortion Transfer of Risk

Insurance Policy Business Income/Extra Expenses (not triggered under a regular BI/EE policy) – insured’s loss of income as a direct result of e-commerce incident to disrupt insureds system Public Relations (what if the competition finds out that you’ve had a breach, might they use that to “lure” your customers) Fines/Penalties/Defense costs from regulatory proceedings-where allowed by law Telecom E&O—Errors and Omissions and Financial Damage Allegations Transfer of Risk

Claims Examples from Additional Coverage Client is sued for allegedly using digital image on its website without the permission of the owner. An organization’s systems were hacked and its data encrypted by cyber criminals who demanded that a ransom is paid to release the encryption keys. Data was corrupted after a thumb-drive containing malware was inserted to the organization’s systems.

Transfer of Risk Contracts Get a good one to avoid this…

?

Thank You Peter J Elliott-President and CEO