Liberty International Underwriters

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Cloud Computing David Gallagher Senior Underwriter, IT Liability 25 th October 2011.
CSI 2005 Computer Crime Survey Put together by J. Scott, 2006 Using Graphics and Text from the Published CSI/FBI 2005 Crime Survey.
Operational Risk ACSDA Leadership Forum ACSDA Leadership Forum New York City, USA - October 8-10, 2007 Diana Downward, DTCC.
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
3rd Party Risk Categorization Process
K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
The Financial Impact of Cyber Security 50 Questions Every CFO Should Ask A publication of the American National Standards Institute and the Internet Security.
Computer Crime and Information Technology Security
“Mitigating Offshoring Risks in a Global Business Environment“
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Non Physical Business Interruption Malcolm Randles, Underwriter, Kiln Syndicate February 2011.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Cyber Risk Insurance. Some Statistics Privacy Rights Clearinghouse o From 2005 – February 19, 2013 = 607,118,029 records reported breached. Ponemon Institute.
By Group B Jessica George Stephanie Williams Maria L. Moya Rekeisha Scott Alberto Camacho.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Hurdles in implementation of cyber security in India.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
New A.M. Best Cyber Questionnaire
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Aim: Can you avoid becoming a victim? How would you react if you become the victim of a crime?
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
MIS323 – Business Telecommunications Chapter 10 Security.
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
EIC – Jornada ciberatacs cyber risk outlook June 2016.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Cyber Risk Management and Insurance
Actuarial Review of Emerging Risks
Cyber Insurance Risk Transfer Alternatives
Information Security Program
New A.M. Best Cyber Questionnaire
Financial Institutions – Cyber Risk
Managing a Cyber Event Steven P. Gibson President
Information Technology Sector
Cyber Security: State of the Nation
Can Cyber Insurance Stand in the Data Breach
Responding to Intrusions
Chapter 5 Electronic Commerce | Security
The Cyber Threats Landscape
CSI Survey 2007 Tiffany Gorman
Andy Hall – Cyber & Tech INSURANCE Specialist
Network Intrusion Responder Program
Cyber Trends and Market Update
Chapter 5 Electronic Commerce | Security
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
The Financial Impact of Cyber Risk 50 Questions Every CFO Should Ask
Cybersecurity compliance for attorneys
Must cost less than possible Impact
Cyber Risk & Cyber Insurance - Overview
Steppa Cyber Security Training Tips Your Business Was Seeking For With Cyber Security Training!
Protect Your Ecommerce Site From Hacking and Fraud
National Information Assurance (NIA) Policy
LO1 - Know about aspects of cyber security
Presentation transcript:

Liberty International Underwriters How Technology is Impacting Environmental Insurance William Bell Senior Vice President, LIU October 28, 2016

Cyber Landscape Destructive Hacking Attempts Targeting Critical Infrastructure Percent of Companies What is a cyber incident? 40% 54% The evolution of cyber risks battled attempts to shut-down their computer networks encountered attempts to manipulate their equipment through a control system Source: Organization of American States, 2015 Poll

Cyber Breach Incidents Defined WHO perpetrates CRIME WHERE can these risks happen, greatest threat? vs TERRORISM WHAT motivates these criminals WHEN do they occur? Opportunistic vs Targeted Who, What, Where & When WHO perpetrates WHAT motivates these criminals WHERE can these risks happen, greatest threat? WHEN do they occur? Opportunistic vs Targeted

Impact of Cyber Breach Incidents Area Description Loss of Confidentiality Loss of information, critical data, customer information, financial data, etc. Loss of Integrity The critical system is in operation but the company cannot control the system or the process; i.e., someone external to the company/entity is controlling the systems Loss of Availability Denial of Service Attack System becomes inoperative or ineffective Destruction of System Destruction of system Source: “Protecting Organizations from Cyber Attack, Cliff Glantz and Guy Landine- Pacific Northwest National Laboratory, 2012

Cyber Breach Exposures At a site Operating processes Adjacent to site Industry and Infrastructure In proximity to a site Densely populated areas or natural resources Business income Impact of closed operations

Environmental Insurance Policy types Definition of a pollution condition Basic coverage descriptions No cyber exclusion!

War and Terrorism Exclusions War Exclusion Terrorism Exclusion Terrorism Coverage Grant

Risk Mitigation Controlling the exposure Best practices Loss control Interdisciplinary coordination Risk transfer

QUESTIONS?