Managing a Cyber Event Steven P. Gibson President

Slides:



Advertisements
Similar presentations
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Advertisements

Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Presented at: Ctuit Software and Lathrop & Gage LLP Food & Hospitality Roundtable San Francisco, CA April 29, 2013 Presented by: Leib Dodell, Esq.
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
Cyber Insurance Today: Lots of Interest, Lots of Product Innovation, and Lots of Risk Richard S. Betterley, CMC Betterley Risk Consultants, Inc. Sterling,
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Overview of Identity Theft, Data Breaches and Cyber/Privacy Liability Insurance October 6, 2009.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
Presented by: Jamie Orye, JD, RPLU Beazley Group Pennsylvania Association of Mutual Insurance Companies Annual Spring Conference March 12, 2015.
Recent Trends and Insurance Considerations March 2015
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
Why are Small and Mid-Size Companies Easy Targets for Hackers, and What can You do to Protect Yourself? 2/11/2015 Asher Dahan.
NEFEC - Cyber Liability MICHAEL GUZMAN, ARM ARTHUR J. GALLAGHER & CO.
Overview of Cybercrime
Leadership, Knowledge, Solutions…Worldwide. Privacy & Data Security Understanding Identity theft The art of managing a crisis Jim Leonard – Marsh FINPRO.
©2015, Amy Stewart PC Title Here Cyber Insurance: The Future is Now Texas Lawyer In-House Counsel Summit May 8, 2015 Texas Lawyer In-House Counsel Summit.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
AUGUST 25, 2015 Cyber Insurance:
Cyber Risk Insurance. Some Statistics Privacy Rights Clearinghouse o From 2005 – February 19, 2013 = 607,118,029 records reported breached. Ponemon Institute.
0 Marsh Issues in Risk Management: Privacy and Data Breach Risk Review & Discussion John McLaughlin, Marsh USA.
CYBER INSURANCE Luxury or necessary protection?. What is a data breach? A breach is defined as an event in which an individual’s name plus personal information.
. E-Business Risk and Insurance.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Cyber-insurance coverage: do you have it? Robert E. Sumner, IV, Esq. and Tosh Siao of Willis Group September 17, 2015.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Carlsmith Ball LLP Cyber Issues For Lawyers Deborah Bjes October 22 nd, 2015.
A PM’s Guide to Surviving A Data Breach. Compliance: PCI QSA and PCI Gap Analysis FISMA HIPAA SSAE 16 GLBA, Red Flags Response Incident Response and Disaster.
1 CONFIDENTIAL ©2015 AIR WORLDWIDE New Approaches for Managing Cyber Risk.
Managing Your Cyber/E&O Risk with Willis FINEX Robert Barberi, Vice President, Willis Cyber Practice.
New A.M. Best Cyber Questionnaire
Cyber Liability Insurance Why we have it & How it works
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Law Firm LLP | Cyber Insurance | July 16th, 2014 Page 1 Cyber Exposure Landscape "The single biggest threat still is people inadvertently bringing down.
Prepared By: John Marshall, CRM, ERMCP, CIC, AAI Jenny Jacobsen, JD Cyber Liability Update April 21, 2016 Welcome.
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
CGL Coverage B and Specific Products Covering Data Breaches Primerus Convocation Amelia Island, FL April 2015.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Cyber Insurance - Risk Exposures and Strategic Solutions
Cyber Liability Insurance for an unsecure world
Cyber Insurance Risk Transfer Alternatives
Breaking Down Cyber Liability
New A.M. Best Cyber Questionnaire
Financial Institutions – Cyber Risk
Understanding Your Dealership Insurance Program
Financial Technology in Cyber Risks
Cyber Insurance presentation for: The 2nd Anti Cybercrime Forum Beirut, 29th November 2016 Alexander Blom, Head of Financial Lines, AIG MENA.
E&O Risk Management: Meeting the Challenge of Change
John A. Wright, CEO WIPFLI Client Appreciation June 8, 2017
Responding to a Data Breach 360° of IT Compliance
Cyber Insurance Overview
Cyber Insurance 101 South Texas Chapter Risk & Insurance Management Society May 17, 2017 Matt C. Green, Marsh.
Cyber Insurance: An Update on the Market’s Hottest Product
Society of Risk Management Consultants Annual Conference
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Cyber Exposures The Importance of Risk Identification and Transfer
By Joseph Carnevale, CIP Partner & Director of Sales
Vinny Sakore Vinny Sakore is the Chief Technology Officer for NetDiligence®, a Cyber Risk Management company. Former HIPAA Security Officer for Verizon.
Cyber Liability Coverage – Sell it or get sued
Forensic and Investigative Accounting
Vinny Sakore Vinny Sakore is the Chief Technology Officer for NetDiligence®, a Cyber Risk Management company. Former HIPAA Security Officer for Verizon.
Cyber Security: What the Head & Board Need to Know
Presentation transcript:

Managing a Cyber Event Steven P. Gibson President Dealer Risk Services, Inc. sgibson@dealerriskservices.com www.dealerriskservices.com

A REVIEW OF THE EXPOSURE Entities that we entrust to safeguard our Personal and Confidential information Banks/Lending Institutions Physicians/Medical Offices Auto Dealerships Of these 3...which would be the most vulnerable to a cyber/security breach?

DEALERSHIP AREAS OF EXPOSURE Handling/Storage of Hard/Paper Files Customer Files HR Files DMS Systems Dealership Computer Systems/Servers Employee Owned Devices

POTENTIAL PERPETRATORS Disgruntled Employees Terminations Under performers Employees with unknown issues Outside Influences Hackers Competitors Vendors

CLAIM/EVENT CONSEQUENCES Cost of Legal Services Cost of Computer Forensic Services Mandatory Notification Costs Call Center Services Breach Resolution and Mitigation Services Suits/Litigation Individuals Class Action Public Relations and Crisis Management Expenses Fines and Penalties

INSURANCE 101 Handling the Cost of a Loss Risk Avoidance – Eliminating the Risk Risk Acceptance – Accepting the entire cost of the Risk Risk Transfer – Moving all or a portion of the Risk to a Third Party

CYBER – SPECIALTY MARKETS AIG BEAZLEY ENDURANCE HISCOX LIBERTY INTERNATIONAL CHUBB LLOYDS

THE COVERAGE Insuring Clause I – Cyber & Privacy Cyber Liability Privacy Liability System Damage System Business Interruption Consequential Reputational Harm Regulatory Actions and Investigations

THE COVERAGE (CONTINUED) Insuring Clause II – Privacy Breach Notification Costs Your Notification Costs Third Party Notification Costs

THE COVERAGE (CONTINUED) Insuring Clause III – Cyber Crime Computer Crime Identity Theft Cyber Threats and Extortion Telephone Hacking Phishing Scams

THE COVERAGE (CONTINUED) Insuring Clause IV – Multimedia & Advertising Injury Defamation Intellectual Property Rights Infringement Invasion of Rights of Privacy Content Liability

THE COVERAGE (CONTINUED) Insuring Clause V – Technology Errors & Omissions Insuring Clause VI – Court Attendance Costs Insuring Clause VII – Crisis Communications Costs

THE COVERAGE (CONTINUED) Definitions You/Named Insured Claim Cloud Computing Provider Computer Systems Confidential Information Hacking Attack Security and Privacy Third Party Loss Exclusions Fines and Penalties (unless insurable by law)

THE COVERAGE LIMIT Limit of Liability per Claim Aggregate Limit of Liability How Much is Enough Potential Exposure Number of Records (PIIs) held Notification Costs $ 35 to $ 135 per Record Public Relations Costs Defense Costs Normally included in Limit of Insurance Deductibles Retention Limits

THE CYBER EVENT TEAM Breach Response Team Event Analysis (forensics) Managing the Response Notification Letters Credit Monitoring Monitoring Affected Individuals Public Relations Initial Damage Control Ongoing Campaigns

NOTIFICATION PROCESS - TIMELINE Notification to Carrier Carrier Breach Team investigates the extent of the breach and consults with Insured on regulations Insured and Counsel approve notification letter Notification letters sent with offer of Credit Monitoring Package Responses of potentially affected Individuals are monitored

PUBLIC RELATIONS Post Event Public Relations Campaign Key Strategies Designed to lessen the negative impact on sales Reduce potential for class action litigation Key Strategies Manage the News Initial Press Releases Ongoing Ad Campaign Initiate Preventative Measures Reactive measures Proactive measures

The Storm on the Horizon Large Data/Security Breaches Yahoo 500M Records MySpace 360M Records LinkedIn 167M Records Ebay 145M Records Target Stores 110M Records Sony Entertainment 102M Records Anthem 80M Records JP Morgan/Chase 76M Records Target 70M Records The Home Depot 56M Records Ashley Madison 37M Records Office of Personnel Mgmt 21.5M Records Excellus Blue Cross 10M Records Community Health Services 4.5M Records Neiman Marcus 1.1M Records

Breach Cost – example Target Stores Class Action Lawsuits Notification Costs Loss of Revenues