Travelers CyberRisk for Insurance Companies

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Identifying and Responding to Security Incidents in the Law Firm
Copyright © XiSEC, All rights reserved, 2002 Secure Computing Best Lifetime Achievement Award 2002 Ted Humphreys Information Security Management Goes Global.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL

Introducing Computer and Network Security
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Session 3 – Information Security Policies
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Northern Insuring Agency 1. 2 Important Notice ●This presentation is not a representation that coverage does or does not exist for any particular claim.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Information Security Technological Security Implementation and Privacy Protection.
SEC835 Database and Web application security Information Security Architecture.
General Awareness Training
Overview of Cybercrime
Defining Security Issues
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
BUSINESS B1 Information Security.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
AUGUST 25, 2015 Cyber Insurance:
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Security considerations for mobile devices in GoRTT
Robert W. Carruth, CSP, ARM-P Risk Control Manager NCACC Risk Management Services.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Cyber Risk Insurance. Some Statistics Privacy Rights Clearinghouse o From 2005 – February 19, 2013 = 607,118,029 records reported breached. Ponemon Institute.
© MISHCON DE REYA MAY 2014 RECRUITMENT INTERNATIONAL FINANCIAL DIRECTORS’ FORUM Protecting your business from unlawful competition.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
The State of Computer & Data Security in Corporations Independent Survey.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
New A.M. Best Cyber Questionnaire
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Security and the “H” word Glen Klinkhart, CEO Mike Messick, CTO.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Welcome to the ICT Department Unit 3_5 Security Policies.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Cyber Insurance Risk Transfer Alternatives
Law Firm Data Security: What In-house Counsel Need to Know
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Cybersecurity - What’s Next? June 2017
E&O Risk Management: Meeting the Challenge of Change
Demystifying cybersecurity: Best practices to help strengthen your program Chris Candela Senior Consultant Business Consulting Services Charles Schwab.
Securing Information Systems
Chapter 3: IRS and FTC Data Security Rules
Cyber Issues Facing Medical Practice Managers
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Cybercrime and Canadian Businesses
Considerations for Cybersecurity and Data Security in Today’s World
Forensic and Investigative Accounting
Cyber Security: What the Head & Board Need to Know
Presentation transcript:

Travelers CyberRisk for Insurance Companies Heather Coelho - March 2015

Important Notice This presentation is not a representation that coverage does or does not exist for any particular claim or loss under any insurance policy. This presentation is not intended as legal advice. A company should always seek the advice of a qualified attorney when evaluating legal or statutory considerations. This presentation is not intended as insurance advice. A company should always seek the advice of a qualified insurance agent or broker when considering their insurance coverage.

Cyber Liability “There are only two types of companies. Those that have been hacked and those that will be.” — Robert Mueller, FBI Director, 2012

Agenda Reasons to think about Cyber Risk Management Techniques Costs Associated with Cyber exposures Dispel Risk Management Myths

New Cyber Threat Ransomware: Examples: Takes user information hostage and requires payment for its return Examples: CryptoLocker CryptoWall Kovter

Risk Management Evaluation What loss control initiatives do you have in place? Have you implemented regular audit procedures of all information security protocols and systems? Do you have a formal: business continuity plan? disaster recovery plan? information security policy? procedure for handling a data breach incident? Who is responsible for information security? Are employees trained on all policies relating to information security? What is your company policy for employee usage of company assets (computers, mobile devices, etc.)?

Top Five Types of Security Risks Network Security Virus, SQL Injection, Malware, Trojan Horses, etc. Physical Loss or Theft Lost or stolen laptop; physical file security Cyber Extortion Gaining access to sensitive data and threatening to release it Employee Mistakes IT professionals can’t prevent these types of losses Denial of Service Attack Targeted attack to slow or stop a network

Cyber Liability The average cost per record of a data breach increased to $201 in 2014 from $188 in 2013. - Ponemon 2014 Cost of Data Breach: Global Analysis

Information Security Policy Safeguard Privacy of Information Establish Password Management Govern Internet Usage Manage Email Usage Govern Company-owned mobile devices Establish Approval Process for Employee Owned Devices Govern Social Media Usage Oversee Software Copyright & Licensing Report Security Incidents

Network Security Strategies Set clear administrative privileges Secure your private network Secure endpoints by configuring DMZ Monitor the network Maintain firewalls Establish intrusion detection and prevention systems Protect remote access Isolate guest WLAN Use encryption programs Define and practice continuity plans/disaster recovery

Cyber Liability Incident response plans reduced the per record cost of a breach by an average of $12.77 - Ponemon 2014 Cost of Data Breach: Global Analysis

Incident Response Plan Develop and test it! Key Steps: Assemble your incident team Decide on effective outside help Validate the breach Manage the evidence Take action to mitigate the impact Clean your network of malicious code Notify data owners Conduct “lessons learned”

Lost Laptops (and other Mobile Information Devices) A 2008 Ponemon Institute study indicates that business travelers are losing over 10,000 laptops every week at U.S. Airports Only 1/3 of them are reclaimed Laptops not reclaimed are often sold at auction or donated to charity after 30 days More than 53% of business travelers polled say their laptops contain private or confidential information Further, 65% admit they do not take precautions to secure the information on their laptop

“Costs” of a Lost Device Average value of a lost laptop is around $50,000 and of a lost smartphone is $37,000 Replacement cost, detection, forensics, data breach, lost IP costs, lost productivity, and legal, consulting and regulatory expenses When data breach is possible, this exposure represents 80% of the costs $20,000 less costly when encrypted

Cyber Liability 31% of all breaches have occurred in organizations of 2,500 or fewer employees and 30% in organizations of fewer than 250 employees. - Symantec 2014 Internet Security Threat Report

Risk Management Myth #1 I Don’t Need to Consider Insurance Coverage: I’ve Never Had a Problem and I Don’t Know Anyone Who’s Had a Loss The legal landscape addressing the Internet is still developing Recent legal and statutory changes are requiring disclosure of security breaches – State Departments of Insurance, State Attorney Generals, FCC The requirement of insurance protection for data liability is beginning to be included in many customer contracts Can a company afford to handle all aspects of a data breach on its own? Traditional insurance products were not designed for current exposures. Insurance products continue to develop in response to the need.

Risk Management Myth #2 Only High Profile Companies Have Exposure To Internet Liability Types Of Claims The nature of the exposure is changing “Hacking” moving from thrill-seekers to the criminal realm Criminals are targeting small to midsize businesses because their security is easier to penetrate Hacking large corporations and government entities makes “news” but most data breaches involve companies with fewer than 100 employees (Verizon 2013 Data Breach Investigations Report) Virus attack and transmission is blind to size or prominence of company

Risk Management Myth #3 Risk Management Will Eliminate Exposures Good risk management reduces exposure and helps in defense of a claim but does not eliminate the exposure. High profile cases of large companies damaged by computer viruses and hacked by outsiders. Do you have better data security than each of these companies and government agencies? Dept. of Defense, FBI, NASA, Apple, Amazon, CIA, Google, etc. All of these companies have been hacked since the start of 2011. Firewalls, virus protection, intrusion detection, etc. are good…but they can be compromised, both externally and internally. Almost half of all data breach incidents are caused by staff mistake, lost device or rogue employee.

References Follows Us /company/travelers @travelers /travelers www.travelers.com/cyber Contact Me hcoelho@travelers.com 267.675.3149 The SANS Institute: http://www.sans.org/ Ponemon Institute: http://www.ponemon.org/ NetDiligence: http://www.netdiligence.com/

Questions?