Andy Hall – Cyber & Tech INSURANCE Specialist

Slides:



Advertisements
Similar presentations
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Advertisements

Travelers CyberRisk for Insurance Companies
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Information Security Governance
Why Comply with PCI Security Standards?
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
General Awareness Training
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Overview of Cybercrime
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Cyber Security & Fraud – The impact on small businesses.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
A PM’s Guide to Surviving A Data Breach. Compliance: PCI QSA and PCI Gap Analysis FISMA HIPAA SSAE 16 GLBA, Red Flags Response Incident Response and Disaster.
CYBER RESILIENCE BEST PRACTICE. To Discuss Why cyber risk management is increasingly challenging How everyone has a role to play in your cyber risk management.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
New EU General Data Protection Regulation Conference 2016 Managing a Data Breach Prevention-Detection-Mitigation By Gerard Joyce Dun Laoghaire Feb 24 th.
Regional Cyber Crime Unit
Risk Outlook Anti money Laundering and Cybercrime Steve Wilmott and George Hawkins.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Information Security Proposal POP’S POP SPRITZERS JULY 2016.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Cyber Insurance Risk Transfer Alternatives
Cybersecurity as a Business Differentiator
Clients and Prospective Clients on the Threat of Cyber Crime
Cyber Issues for Design Professionals
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Information Security Program
Cyber Security Zafar Sadik
New A.M. Best Cyber Questionnaire
Cybersecurity - What’s Next? June 2017
Cyber Insurance presentation for: The 2nd Anti Cybercrime Forum Beirut, 29th November 2016 Alexander Blom, Head of Financial Lines, AIG MENA.
Demystifying cybersecurity: Best practices to help strengthen your program Chris Candela Senior Consultant Business Consulting Services Charles Schwab.
Insurance Technology Forums: ‘IT Matters’ Forum
Gift Card Risk Mitigation – Presentation A
Information Technology Sector
RCCU Zephyr South West Regional Cyber Crime Unit.
Chapter 3: IRS and FTC Data Security Rules
Cybersecurity Awareness
I have many checklists: how do I get started with cyber security?
CYBER CRIME Matthew Purchase.
Cyber Trends and Market Update
Securing the Threats of Tomorrow, Today.
Keeping your data, money & reputation safe
Cyber Risk & Cyber Insurance - Overview
Cyber Security Culture
Cybercrime and Canadian Businesses
Business Continuity Plan
Protect Your Ecommerce Site From Hacking and Fraud
Forensic and Investigative Accounting
Cyber Security: What the Head & Board Need to Know
Cyber Security in a Risk Management Framework
DSC Contract Management Committee Meeting
Presentation transcript:

Andy Hall – Cyber & Tech INSURANCE Specialist What CYBER trends are BHIB seeing and what we believe are the significant risks to the Life sciences industry AND Ways to mitigate the risk Andy Hall – Cyber & Tech INSURANCE Specialist

CyberCRIME Fraud & Cybercrime are the UKs most common Offences Cybercrime now accounts for over half of Reported Crime Rarely a week goes by without a Data breach or Cybercrime story hitting the headlines Everyone could be a victim The Life Sciences sector hold significant volumes of personal and sensitive data as well as intellectual property

Some INSURANCE Statistics Source. CFC underwriting 2017

What are THE SIGNIFICANT RISKS TO LIFE SCIENCES BUSINESSES Fall in Share Price or Company Valuation Regulatory Fines (GDPR) Operational Disruption / Service denial Loss of Reputation Cost Per Stolen Record higher Lost Intellectual property

Common ways How do cyber breaches occur Ransomware = Lost Data / Additional costs ie Forensics Phishing = Money Loss / Lost Data CEO Fraud = Money Loss Human Error = Data protection / money loss Denial of Service attacks = Additional costs ie Forensics Telephone Hacking = Money Loss GDPR = Prospect of Increased Fines / Additional costs

How can you protect your BUSINESS BASIC SECURITY – Establish & Build Defences Keep Software Updated Have a contingency plan Make sure Passwords are strong Educate staff and refresh training regularly Make sure Data is regularly backed up Policies, standards & control frameworks Vet your Outsource Service Providers Physical Network Controls/Malware protection Monitoring & Double Verification Procedures

How can you protect your BUSINESS ANALYSING THREATS – Be vigilant Vulnerability detection security control management Penetration testing Threat intelligence & research Application security Compliance monitoring

How can you protect your BUSINESS Responding To Cyber threats & Incidents Cyber incident response Crisis management Investigations & forensics IT resilience & recovery Consider Insurance ?

INSURANCE

THANK YOU FOR LISTENING