Overview and Services March 2015

Slides:



Advertisements
Similar presentations
Life Science Services and Solutions
Advertisements

Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
1 Risk Management at Progressive Insurance How we got started Getting corporate support Capital Management Examples of deliverables The value risk management.
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
MODELING CORPORATE RISK AT FORD Freeman Wood Director Global Risk Management.
M&A & Insurance Mergers & Acquisitions Capabilities Presentation RIMS Fairfield/Westchester Chapter May 14 th, 2013.
Sapient Insurance Partners. Overview & Services We have almost four decades of combined experience in the property & casualty insurance and reinsurance.
CONSTRUCTION & THE FOOD INDUSTRY The Insurance Industry View Steve Exwood & Jon Miller.
Financial Advisory & Litigation Consulting Services Risk Management 2006 September 14-15, 2006 The Metropolitan Club, New York, NY Workshop B: Information.
Overview of Cybercrime
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
RISK MANAGEMENT Copyright (c) 2011 FutureSoft ( 1.
Geneva Association/International Insurance Society Research Presentation, Chicago Enterprise Risk Management in the Insurance Industry Madhusudan.
Corporate Social Responsibility LECTURE 25: Corporate Social Responsibility MGT
Managing Your Cyber/E&O Risk with Willis FINEX Robert Barberi, Vice President, Willis Cyber Practice.
Sapient Insurance Partners. Overview & Services We have almost four decades of combined experience in the property & casualty insurance and reinsurance.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Restaurant 1. 2 There are several different types of restaurant classifications, including: Family Style Fine Dining Fast Food Buffet.
Managing Uncertainty, Creating Opportunity Enterprise Risk Management J. Brown, CEO.
JEFFREY L. HUNTER SR RISK ANALYST County of Riverside Human Resource Dept. Risk Management Div. Insurance Requirements In Contracts.
Info-Tech Research Group1 V3.1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services.
Quantifying Cyber Security Risk in Dollars and Cents to Optimize Budgets CRM008 Speakers: Chris Cooper, VP, Operational Risk Officer; RGA Reinsurance Company.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
MEDICAL OFFICE COVERAGES. This is a short review over many insurance coverage parts necessary to a doctor’s practice. Not all apply, and there are other.
Retail & Service 1. 2 The Retail & Service industry encompasses a wide variety of businesses. This segment includes: Businesses engaged in selling goods.
How can your Captive help you manage Cyber risks?.
Cyber Insurance - Risk Exposures and Strategic Solutions
Cyber Liability Insurance for an unsecure world
Cyber Insurance Risk Transfer Alternatives
New A.M. Best Cyber Questionnaire
Software Risk Management
Cyber Insurance presentation for: The 2nd Anti Cybercrime Forum Beirut, 29th November 2016 Alexander Blom, Head of Financial Lines, AIG MENA.
Green and Sustainable Remediation (GSR) Overview
Society of Risk Management Consultants
Cyber Insurance – FFs & CHBs
Can Cyber Insurance Stand in the Data Breach
Risk Management for Technology Projects
ESSENTIALS OF A PHYSICAL SECURITY SYSTEMS RISK ASSESSMENT
The Sendai Framework Data Readiness Review 2017
Microsoft SAM Managed Service Program
I have many checklists: how do I get started with cyber security?
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
Black Rock- A sense of Purpose
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Cyber Exposures The Importance of Risk Identification and Transfer
Cyber Risk & Cyber Insurance - Overview
Risk & Insurance for AESA Members From USI Insurance Services
Microsoft SAM Managed Service Program
SOUTH AFRICAN INSURANCE ASSOCIATION
Employee engagement Delivery guide
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Retirement Benefit Fund, Trustee and Third Party Provider Insurance
Third-party risk management (TPRM)
Strategic threat assessment
Investing in Source Water Protection
Cyber Security: What the Head & Board Need to Know
Cyber Security in a Risk Management Framework
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Session 8: Innovative Uses of Captives: Cyber and Beyond
Growth and innovation Project support overview.
Finance organizational structure
Internal controls Project support overview.
KEY INITIATIVE Financial Data and Analytics
Portfolio planning Project support overview.
Getting Knowledge into Action for Healthcare Quality
Presentation transcript:

Overview and Services March 2015 PROPRIETARY & CONFIDENTIAL

Axio is fundamentally changing the way that organizations understand and manage cyber risk. Our vision brings together technology, risk engineering, insurance, and data science to quantify, reduce, and transfer cyber risk. Our work addresses the full range of potential cyber impacts, including information theft, property damage, bodily injuries, operational disruption, and environmental damage. We provide: An approach designed to deliver advanced cyber risk management by harmonizing the utilization of cyber security technology and cyber insurance, A seamlessly integrated process to achieve harmony; one that combines an understanding of insurance coverage, cyber loss scenarios, program maturity, risk engineering, and cyber insurance customization. A Cyber Sapience™ Dashboard that helps cyber security leaders measure program implementation and maturity, track performance and inform investment, Deep insurance expertise that extends beyond the means by which most insurance professionals currently understand cyber risk, and © 2015 Axio Global

OUR APPROACH INVEST IN CYBER CAPABILITY DEVELOPMENT SUSTAIN CAPABILITY AND INVEST IN INSURANCE Insurance lowers the risk impact curve overall Perhaps the biggest challenge currently faced by CISO’s, Risk Managers and Boards of Directors is the lack of actionable insight and metrics related to cyber program performance and cyber risk exposure. These individuals yearn for better information to help inform investment, continually mature cyber programs, and communicate resilience to shareholders and stakeholders. The insurance industry has filled this void in others areas of risk, such as the tangible property world, where dependable exposure and loss metrics have help inform investment into protective controls. This insight helps risk professionals achieve better harmony of controls and more effectively spend their next dollar to achieve the greatest risk reduction benefit. Axio Global is changing the game to deliver the cyber risk engineering promise of the insurance industry and help firms harmonize investment into cyber security technology and cyber insurance. © 2015 Axio Global

AXIO PROCESS The Axio process includes 5-steps that result in an optimized response to your cyber risk. Depending on your situation, all 5 steps may not be needed—we offer each step as an independent engagement. The completion of all steps leads to deployment of insurance instruments to protect your balance sheet with more comprehensive risk transfer capacity. Cyber Sapience™ Dashboard Program evaluation workshop to deploy the Axio dashboard. Provides initial programmatic benchmark. Evaluation is based on C2M2, the Cybersecurity Capability Maturity Model — a recommended approach to deploy the NIST Cyber Security Framework. Cyber Loss Scenarios Create notional and feasible cyber loss scenarios. 1-Day Workshop to describe scenarios that could lead to covered and uncovered losses; estimate potential impacts. Cyber Risk Engineering Inform investment through in-depth analyses. Detailed impact studies, frequency estimation, loss controls, statistical modeling, and improvement planning. Insurance Placement With brokers and insurers, secure meaningful coverage. Various new coverage forms and enhanced existing forms are becoming available. Policy Analysis Work with broker to identify gaps in current insurance coverage. Understand the types of cyber events that are not covered by your current insurance. 1 2 3 4 5

CYBER SAPIENCE™ DASHBOARD Backed with financial data, CFOs are ready to brief the board at a moment’s notice. Axio’s Cyber Sapience™ Dashboard provides CISOs with the data set to do the same. The Cyber Sapience™ Dashboard provides CISOs constant visibility into cyber risk exposure and the overall health of the organization’s cyber program. Our holistic and cost effective solution: CYBER SAPIENCE INDEX PEER COMPARISON MEASURES IMPLEMENTATION & MATURITY Based on C2M2 — a recommended approach to deploy the NIST Cyber Security Framework. TRACKS PERFORMANCE By benchmarking internally and against peers. INFORMS INVESTMENT Helps prioritize investment decisions and defend your program’s budget. QUANTIFIES CYBER RISK EXPOSURE Captures impact estimates for your unique risks and helps understand the boundaries of your insurance program in covering those impacts. RISK IMPACT BENCHMARK BY SCENARIO WITH AND WITHOUT INSURANCE

C2M2 MODEL OVERVIEW © 2015 Axio Global 6

Type of Loss / Potential Coverage INSURANCE The insurance industry has made meaningful strides over the past decade to design and offer products to cover cyber exposures. However, the industry has only scratched the surface with respect to the scope of available products against the scope of potential exposure. Additionally, for many industries, currently available “cyber” coverage is a mere piece of the puzzle; multiple lines of insurance coverage need to be understood. Our approach and taxonomy contemplates the entire portfolio and those areas of coverage that could be impacted by a cyber event and therefore provides the most comprehensive perspective on how to most effectively structure risk transfer. Any major cyber event will result in PR, Response, and continuity costs Immediate and extended revenue loss Restoration expenses Defense costs 1st Party 3rd Party Privacy Breach Event Expense Information Asset Cyber Extortion Network Business Interruption Regulatory Defense and Fines Cyber Liability Technology Errors and Omissions Miscellaneous Errors and Omissions Product Recall Financial Third parties will seek to recover Civil penalties and awards Consequential revenue loss Restoration expenses General Liability Excess Liability Umbrella Pollution Terrorism Products Liability Property Workers Comp Terrorism Umbrella Tangible Physical damage may cascade to others 3rd party property damage 3rd party bodily injury Physical damage is now possible 1st party property damage 1st party bodily injury Cyber Loss Spectrum Type of Loss / Potential Coverage

CONTACT US SCOTT KANNRY skannry@axioglobal.com 708.420.8611 New York, NY © 2015 Axio Global