Breaking Down Cyber Liability

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Travelers CyberRisk for Insurance Companies
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
Presented by: Jamie Orye, JD, RPLU Beazley Group Pennsylvania Association of Mutual Insurance Companies Annual Spring Conference March 12, 2015.

BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
Protecting Sensitive Information PA Turnpike Commission.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
General Awareness Training
NEFEC - Cyber Liability MICHAEL GUZMAN, ARM ARTHUR J. GALLAGHER & CO.
Overview of Cybercrime
Defining Security Issues
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © 2014 CUNA Mutual Group, All Rights Reserved. Understanding Cyber Insurance.
AUGUST 25, 2015 Cyber Insurance:
Cyber Risk Insurance. Some Statistics Privacy Rights Clearinghouse o From 2005 – February 19, 2013 = 607,118,029 records reported breached. Ponemon Institute.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
© Copyright 2010 Hemenway & Barnes LLP H&B
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Cyber-insurance coverage: do you have it? Robert E. Sumner, IV, Esq. and Tosh Siao of Willis Group September 17, 2015.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Law Firm LLP | Cyber Insurance | July 16th, 2014 Page 1 Cyber Exposure Landscape "The single biggest threat still is people inadvertently bringing down.
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Cyber Liability: New Exposures Presented by: Henriott Group © 2007, , Zywave Inc. All rights reserved.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Cyber Liability and Data Security+. 22 AGENDA What is Cyber? Exposure to Cyber Attacks Cyber Risk Management Anatomy of a Data Breach Insurance Coverage.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Cyber Insurance - Risk Exposures and Strategic Solutions
Cyber Liability Insurance for an unsecure world
Cyber Insurance Risk Transfer Alternatives
Securing Information Systems
Financial Institutions – Cyber Risk
E&O Risk Management: Meeting the Challenge of Change
John A. Wright, CEO WIPFLI Client Appreciation June 8, 2017
Protection of CONSUMER information
Managing a Cyber Event Steven P. Gibson President
Data Compromises: A Tax Practitioners “Nightmare”
Preparing for a Security Incident Response: Are You Compromise Ready?
September 18, 2018.
Cyber Insurance Overview
Chapter 3: IRS and FTC Data Security Rules
Society of Risk Management Consultants Annual Conference
Business Secured with HUB International.
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Ethics, Part 2 Chapter 5 pp National Income Tax Workbook™
By Joseph Carnevale, CIP Partner & Director of Sales
INFORMATION SYSTEMS SECURITY and CONTROL
Las Positas College Flex Day
Forensic and Investigative Accounting
Cyber Security: What the Head & Board Need to Know
Colorado “Protections For Consumer Data Privacy” Law
School of Medicine Orientation Information Security Training
Presentation transcript:

Breaking Down Cyber Liability Businesses and organizations of all sizes are at risk of a cyber attack or data breach. Even the most sophisticated systems have vulnerabilities and the human element of lost laptops, misplacing a paper file or opening an email attachment can affect your insured’s company. No system is fool proof no matter how good you think it is which is why insured’s need cyber insurance. As with so many things, it’s not if an insured has a loss it’s when an insured has a loss. Kim Fielder, CPCU, CRM, CIC, AAI February 2017

WEBSITE VULNERABILITY Company Profile: National Nonprofit Food Bank A metropolitan food bank experienced a cybersecurity breach that resulted in the inadvertent disclosure of more than 10,000 donors’ personal information. Due to malware on their website service the unauthorized individual was able to gain access to donor information over a three year period. The personally identifiable information included names, addresses, emails, credit and debit card numbers, security codes and expiration dates. Computer forensic experts were retained to assist with the investigation. Corrective measures were taken including changing all passwords, implementing additional monitoring and reviewing the food banks policies and procedures to ensure that all information was appropriately protected moving forward. In addition, due to the various state laws that had been implicated, the food bank was required to notify all affected donors and provide identity protection and credit monitoring for a one year period.

$857,400 $543,000 Estimated Legal Defense & Settlement Costs $117,050 According to the Net Diligence Data Breach Cost Calculator the estimated costs for this event could be: $543,000 Estimated Legal Defense & Settlement Costs $117,050 Estimated Fines & Penalties $197,350 Estimated Investigation & Notification Costs $857,400 Estimated Total Costs

PHISHING EMAIL Company Profile: Medical Group An employee of a medical group opened a phishing email that infiltrated their centralized network. Anti-Virus software failed to keep out the malicious code, exposing names, addresses, dates of birth, medical record numbers, medication, dates of service and diagnoses of 1200 patients. A computer forensics investigator was hired, who determined that PHI had been compromised. The medical group notified the affected individuals and hired a public relations firm in anticipation of bad publicity. Thereafter, The Office for Civil Rights launched an investigation and the medical group was fined as a result of a HIPAA violation for having unsecured access to the network.

According to the Net Diligence Data Breach Cost Calculator the estimated costs for this event could be: $46,000 Estimated Customer Notification/Crisis Management Costs $180,000 Estimated incident investigation Costs $364,000 Estimated Fines & Penalties $590,000 Estimated Total Costs

CLOUD HACK Company Profile: Construction Company with offices nationwide A national construction company used a third-party cloud service provider to store their customers’ personal information. The cloud provider suffered a major data breach, compromising the Personally Identifiable Information belonging to thousands of the construction company’s customers in several states. As the owner of the data, the construction company had a legal obligation to provide an adequate and timely notice. The Attorneys General in several states instigated a regulatory investigation against the Company to determine whether they responded appropriately to the breach in accordance with the various state laws. As the construction company did not have a document retention procedure and stored far more data than was required, the Company was obligated to notify over 10,000 past and present customers that their company’s data had been compromised. In addition they had to pay defense costs associated with defending the regulatory investigation.

$862,775 $181,900 Estimated Incident Investigation Costs $41,775 According to the Net Diligence Data Breach Cost Calculator the estimated costs for this event could be: $181,900 Estimated Incident Investigation Costs $41,775 Estimated Customer Notification/Crisis Management Costs $862,775 Estimated Total Costs $639,100 Estimated Defense & Settlement Costs More recently, the St. Louis Public Library locations were found to be inoperable after being hacked and having ransom ware installed on their systems. The origin of ransom ware was traced to Russia but has grown exponentially since 2012.

WHAT IS A BREACH? It’s the acquisition, access, release, or disclosure of information to an unauthorized individual or entity that relates to a person and that may cause the person inconvenience or harm: -Personally Identifiable Information (PII) -Protected Healthcare Information (PHI) Or that may cause your insured’s organization inconvenience or harm: -Customer Data -Employee Data -Corporate Information/Intellectual Property PII Includes: Full, Name, Home Address, Email Address, Passport Number, Credit Card Information, Personal Financial Information: SSN, Drivers License Number, Banking Information, Employment Information, Insurance Information Corporate Information: Business Information including Trade Secrets

TYPES OF BREACHES Lost, missing, stolen electronic assets or equipment Backup tapes lost in transit Lost paper records Hackers Employee theft Poor business practices Internal security failures Viruses and computer security loopholes Improper disposal of both electronic & non-electronic data Physical theft of desktop PCs, laptops, tapes, disks, USB drives, or other devices and media create significant risks to the information stored on these devices. When it comes to breaches of non-public information, according to data available from the Privacy Rights Clearinghouse, physical theft, systems hacks and accidental release are the leading causes of breaches of sensitive or non-public information.

WHERE DO THREATS COME FROM? Inside Threats Employee Negligence Employee Ignorance Malicious Employees Outside Threats Hackers / Hacktivists Thieves Vendors Foreign Governments Hacktivists – Intent is to break into a computer system to sensationalize their specific agenda which is usually politically or socially motivated.

MAKING SENSE OF CYBER COVERAGES Third Party (Liability)Coverages Protection for liability to others Reimbursement or payment for expenses related to a data breach Legal counsel and defense costs Digital forensics team Notification costs Crisis communications – public relations Call centers Credit monitoring Identity restoration costs Reward Expenses Most cyber policies currently in the marketplace offer some combination of traditional liability coverage protecting against claims by third parties (customers, clients, and employees) for failure to protect Personally Identifiable Information (PII), Protected health Information (PHI), and Payment Card Industry Information (PCI). These policies also provide first-party coverages protecting against losses suffered by the insured.

MAKING SENSE OF CYBER COVERAGES Third Party (Liability)Coverages Regulatory Proceedings Defense and penalties Compensatory awards PCI Fines & costs Media Liability/Website Liability Content Injury – Injuries sustained because of infringement of a service mark, slogan, symbol, copyright, title of an artistic or literary work, etc. Spread of viruses or malicious code to someone else’s system.

MAKING SENSE OF CYBER LIABILITY First Party Coverages Data Loss and Restoration Related to recovery from damages to computer programs and electronic data Network/Business Interruption Covers interruptions in business due to breaches of a company’s network Theft and Fraud / Crime Losses Covers costs of theft or destruction of the insureds data and theft of the insured’s funds Social engineering Cyber fraud Social Engineering is the art of manipulating people so they give up confidential information Not all cyber claims are related to a breach. For example, malware downloaded from an email could lead to lost, encrypted or otherwise damaged files requiring expenses to repair and restore. Ransomware can prevent you from using your systems and create a Business Interruption or Business Income Loss in addition to the extortion payment.

MAKING SENSE OF CYBER LIABILITY First Party Coverages Forensic Investigation Covers the costs of determining the cause of a loss of data and what data was accessed Cyber Extortion / Cyber Threat Denial of Service

CYBER LIABILITY / SECURITY POLICIES These policies are not standardized and the coverages offered continue to evolve as criminals become more and more inventive. The terminology within each policy may be significantly different. Most have a modular coverage set up allowing separate insuring agreements, deductibles or retentions, and types of protection. For the most part, standard liability, property and crime policies do not provide coverage for cyber exposures. These differences make it extremely difficult to compare policies and coverages. We do not expect this to change for quite some time.

OPENING THE DIALOG WITH CLIENTS Do you hold any private data of clients, vendors, donors, employees or others? What steps would you take/who would you call if you lost those private records? Do you have a corporate wide privacy policy? Do you have a disaster plan specific to data breaches? Are all records stored electronically? Do you have paper records? Do you shred? Any employees have access to private client records? Do you allow use of USB drives on computers with access to private data? Any records ever handled by a third party? Are any of your systems programmed by non-employees? Are all laptops and wireless connections encrypted?

OPENING THE DIALOG WITH CLIENTS Are you confident your antivirus and firewall systems are 100% effective? If you network was damaged or disabled by a virus or hacker attack, would it be material to your revenues/income? Do you have a back up system? How long would it take you to recover? Are you prepared for a Department of Health and Human Services Compliance Audit? Does your client understand that it’s not if they have a breach but when they have a breach?

Citations/References Travelers - travelers.com/cyber-insurance/claim-stories Riskandinsurance.com National Underwriter Property & Casualty AmWins - Cyber Liability Risks & Solutions Privacy Rights Clearinghouse