Cyber Risk Management and Insurance

Slides:



Advertisements
Similar presentations
You worked hard But you still face risks…. Picture your future… or perhaps you are already there…
Advertisements

Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
CYBER & Product Liability & Professional Indemnity
Travelers CyberRisk for Insurance Companies
Best Practices for Insuring Medical Practices from Cyber Risk.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
Cyber Insurance Today: Lots of Interest, Lots of Product Innovation, and Lots of Risk Richard S. Betterley, CMC Betterley Risk Consultants, Inc. Sterling,
© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Emerging Risks in a Mobile.
Cyber Insurance cs5493(7493). AKA E-commerce insurance E-business insurance Information system insurance Network intrusion insurance.
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
RISK MANAGEMENT FOR INSURERS IN ISRAEL A Regulatory Perspective.
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Why are Small and Mid-Size Companies Easy Targets for Hackers, and What can You do to Protect Yourself? 2/11/2015 Asher Dahan.
Overview of Cybercrime
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © 2014 CUNA Mutual Group, All Rights Reserved. Understanding Cyber Insurance.
2 September 2015 Building Scalable Insurance Programs For Each Growth Stage of a Entrepreneurial Company.
AUGUST 25, 2015 Cyber Insurance:
. E-Business Risk and Insurance.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Matt Foushee University of Tulsa Tulsa, Oklahoma Cyber Insurance Matt Foushee University of Tulsa Tulsa, Oklahoma.
Cyber-insurance coverage: do you have it? Robert E. Sumner, IV, Esq. and Tosh Siao of Willis Group September 17, 2015.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
1 CONFIDENTIAL ©2015 AIR WORLDWIDE New Approaches for Managing Cyber Risk.
Managing Your Cyber/E&O Risk with Willis FINEX Robert Barberi, Vice President, Willis Cyber Practice.
New A.M. Best Cyber Questionnaire
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
NCBFAA Annual Conference 2015 Orlando Converging Logistics: Realities vs. Possibilities Cyber Insurance Bernie Cissek, Chairman.
Being there When you need us Thats our policy. Cyber Awareness – what can be done?
Cyber Security and how to safeguard data in the ‘Cloud’ Claire Jacques 21 April 2016.
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Cyber: risk without borders Airmic 2016 Harrogate International Centre Tuesday 7 th June 2016.
Cyber Liability: New Exposures Presented by: Henriott Group © 2007, , Zywave Inc. All rights reserved.
Dr. Maya Bundt, Head Cyber & Digital Strategy, Swiss Re
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Cyber Liability Insurance for an unsecure world
Actuarial Review of Emerging Risks
Cyber Insurance Risk Transfer Alternatives
Clients and Prospective Clients on the Threat of Cyber Crime
An Information Security Management System
Hot Topics in the Financial Industry: Cybersecurity
New A.M. Best Cyber Questionnaire
Insurance Technology Forums: ‘IT Matters’ Forum
Managing a Cyber Event Steven P. Gibson President
Cyber Insurance – FFs & CHBs
Can Cyber Insurance Stand in the Data Breach
Data & Analytics for P&C Insurers
Chapter 3: IRS and FTC Data Security Rules
Cyber Insurance: An Update on the Market’s Hottest Product
Information Security: Risk Management or Business Enablement?
Society of Risk Management Consultants Annual Conference
Krannert’s Global Supply Chain Business Continuity Planning Discussion
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
By Joseph Carnevale, CIP Partner & Director of Sales
Cybersecurity compliance for attorneys
cyber insurance Tom Wilson Chief Risk Officer, Allianz SE
Cyber Risk & Cyber Insurance - Overview
Risk & Insurance for AESA Members From USI Insurance Services
Neil Kirton and Zoë Newman
Cyber Security: What the Head & Board Need to Know
Presentation transcript:

Cyber Risk Management and Insurance Risks and Rewards Presented by – Jennifer Soper, National Casualty Director, Northbridge

Agenda Applying a traditional Risk Management model to Cyber Risk Mitigation—can everything be insured? Monitoring the plan—how do you know it’s working? Is Cyber spinning out of control?

Risk Management Strategies

Five steps of Risk Management Identify exposures Analyze those exposures Evaluate the risk Implement solution(s) to manage the risk Monitor the outcome

Cyber Risk is not just an IT issue Corporation Board of Directors CEO CFO Legal & HR Risk Manager CRO CSO, CIO

Analyzing and evaluating Cyber Risk Reputation Extortion Hacking Personal Information Manipulation of Data Intellectual Property Virus Business Interruption Customer Data Cloud Compromise Contractual Responsibilities Network Security

Risk Mitigation: The insurance solution

Cyber Risk policy Coverage options are numerous Understanding the exposure = a comprehensive solution How much coverage is too much? First party Third party Incident Response Expenses Network Security & Privacy Cover Digital Asset Expense Internet Media Liability Business Interruption Regulatory Proceeding Expenses E-Commerce Extortion Expenses

Beyond the Cyber Risk policy Blurring the coverage lines Property Covers Commercial General Liability Directors & Officers

The insurance solution: Navigating the abyss Predictive Modelling Reserving Reinsurance Insurance Company Pricing Actuarial Cyber Accumulation accumulation Limits

Monitoring the plan

The role of Claims when it goes wrong The outcome The fix The breach

The Courts The Courts PIPEDA Breach notification and monitoring The Insurers The Insureds PIPEDA Breach notification and monitoring Role of the Cyber policy Will other covers be called in? Jurisdiction

The evolution Past Present Future Cyber Risk? It can’t happen to me It can happen to me

Where do we go from here?

The Future The Internet of Things has pushed the need for Cyber insurance solutions to its greatest level It has caused Insurers to step far beyond their comfort zone as data is limited and still very new Claims, coverage, pricing, modelling and analytics will continue to become more sophisticated but will challenge our traditional thinking of how we look at Cyber risk