1 Why Your Corporate Insurance and Risk Management Program May not Respond to a Cyber Attack In House Counsel Summit Series November 6, 2014 Glenn R. Legge.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

A GIA is a contract between a surety company and a contractor (or subcontractor)/principal. A GIA is a standard, typical document in the construction.
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
CYBER & Product Liability & Professional Indemnity
©2008 Perkins Coie LLP Game Industry Roundtable Privacy Developments for the Game Industry Thomas C. Bell September 24, 2008.
Freshfields Bruckhaus Deringer LLP Global investigations What to advise your board Marius Berenbrok Edward Braham Matthew Herman Melissa Thomas 29 February.
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 Cyber as a Boardroom Issue Date: Wednesday, April 30, 2014 Time: 9:00.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
Cyber Insurance Today: Lots of Interest, Lots of Product Innovation, and Lots of Risk Richard S. Betterley, CMC Betterley Risk Consultants, Inc. Sterling,
David A. Brown Chief Information Security Officer State of Ohio
“This workforce solution was funded by a grant awarded under Workforce Innovation in Regional Economic Development (WIRED) as implemented by the U.S. Department.
Cyber Security and the Smart Grid George W. Arnold, Eng.Sc.D. National Institute of Standards and Technology (NIST) U.S. Department of Commerce
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Overview of VMIA IHEA Forum Monia Choudhary Mark Cleeve August 2013.
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
Recent Trends and Insurance Considerations March 2015
1 Cyber Security and Insurance Coverage: Evolving Risks Where More Than Data Is At Stake Cyber Risks – Insurance Coverage and Regulatory Updates for the.
(Geneva, Switzerland, September 2014)
Draft of June 9, 2015 Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing.
Session 3 – Information Security Policies
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
TERRORISM / POLITICAL VIOLENCE SOLUTIONS FAIR International Insurance Conference on "Political Violence" April 2010 – Karachi Daniel O’Connell
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
Overview of Cybercrime
Marine Industry Day 2015 Sector Command Center (24 hours): (504) National Response Center: Website:
©2015, Amy Stewart PC Title Here Cyber Insurance: The Future is Now Texas Lawyer In-House Counsel Summit May 8, 2015 Texas Lawyer In-House Counsel Summit.
Evolving IT Framework Standards (Compliance and IT)
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Outsourcing Louis P. Piergeti VP, IIROC March 29, 2011.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
AUGUST 25, 2015 Cyber Insurance:
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Cyber Security Nevada Businesses Overview June, 2014.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Matt Foushee University of Tulsa Tulsa, Oklahoma Cyber Insurance Matt Foushee University of Tulsa Tulsa, Oklahoma.
Cyber-insurance coverage: do you have it? Robert E. Sumner, IV, Esq. and Tosh Siao of Willis Group September 17, 2015.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
New A.M. Best Cyber Questionnaire
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
1 EASTERN MUNICIPAL WATER DISTRICT Risk Management and Insurance Program Doug Hefley Director of Safety, Risk and Emergency Management June.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
UNCLASSIFIED Homeland Security 2016 TRB Annual Meeting Cyber Risk Management CAPT Verne Gifford (CG-5PC) 1.
CGL Coverage B and Specific Products Covering Data Breaches Primerus Convocation Amelia Island, FL April 2015.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Cyber Liability Insurance for an unsecure world
Cyber Insurance Risk Transfer Alternatives
Law Firm Data Security: What In-house Counsel Need to Know
New A.M. Best Cyber Questionnaire
Fusion Center ITS security and Privacy Operations Joe Thomas
E&O Risk Management: Meeting the Challenge of Change
Managing a Cyber Event Steven P. Gibson President
LEGAL & ETHICAL ISSUES InsurTech & Health Insurance Providers
Cyber Insurance Overview
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Cybersecurity compliance for attorneys
Cyber Security: What the Head & Board Need to Know
Presentation transcript:

1 Why Your Corporate Insurance and Risk Management Program May not Respond to a Cyber Attack In House Counsel Summit Series November 6, 2014 Glenn R. Legge

2 “As the country becomes ever more dependent on digital services for the functioning of critical infrastructure, business, education, finances, communications, and social connections, the Internet’s vulnerabilities are outpacing the nation’s ability to secure it.” “We are at September 10th levels in terms of cyber preparedness.” -- Reflections on the Tenth Anniversary of the 9/11 Commission Report – The Bipartisan Policy Center – July 2014 Concerns About a Cyber Related 9/11

3 Current cyber threats to the energy industry. Corporate management’s enhanced obligations to protect against cyber threats and provide adequate insurance. Current coverage wordings that address cyber-risks. Current coverage exclusions for cyber-risks, including CL380 and the new ISO provisions and how they may be challenged in the courts. Emerging contractual risk allocation terms to address damages arising from cyber-risks. Issues to be Addressed

– Target Corporation – 40 million credit and debit card accounts. $200 million to reissue 21.8 million credit and debit cards.Target Corporation 2014 – Neiman Marcus – 350,000 payment cards.Neiman Marcus 2014 – Home Depot – 56 million debit and credit cards – JP Morgan Chase – 76 million households, 7 million small businesses – eBay – personal records of 233 million users. Recent Examples of Cyber Attacks or Data Breaches on Retail and Financial Companies

5 Massive use of Big Data – data sets so large and complex that it becomes difficult to process using on-hand data management tools or traditional data processing applications. Big Data managed by “supervisory control and data acquisition” (SCADA) and “industrial control systems” (ICS). Shareholder pressure to improve returns and reduce costs by increasing operational efficiencies through use of IT. Broad geographic distribution of facilities requires use of IT. Energy sector is the focus of cyber intrusions from government- based cyber attackers and non-government groups. Energy Sector – Exposure to Cyber Attack

6 In May 2013, after recognizing various probable cyber risks, the US Department of Commerce commissioned the National Institute of Standards and Technology (NIST) to issue guidelines for SCADA and ICS systems. guidelines U.S. Government’s Early Response to Cyber Threats

7 NIST recognized various probable risks resulting from a cyber attack or data breach. Unauthorized changes to instructions, commands, or alarm thresholds, which could damage, disable, or shut down equipment, create environmental impacts, and/or endanger human life; Inaccurate information sent to system operators, either to disguise unauthorized changes, or to cause the operators to initiate inappropriate actions, which could have various negative effects; and Interference with the operation of safety systems, which could endanger human life. NIST Special Publication , Revision1NIST Special Publication , Revision1. U.S. Government’s Early Response to Cyber Threats

8 August Shamoon malware contaminated up to 30,000 computers at Saudi Aramco. Days later, the computer systems at Quatar-based RasGas were infected by a virus, shutting down the company’s website. June 20, 2014 – A network of hackers called AnonGhost announced it had launched a barrage of cyber-attacks on international energy companies in the Middle East and the United States. Symantec, the IT security company, identified this emerging cyber-threat as Operation Petrol. July 2, 2014July 2, 2014 – The Department of Homeland Security's Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) warned energy companies of malicious software used by “a Russian hacking group known as ‘Energetic Bear’ or ‘Dragonfly’... that primarily targets the energy sector and related industries.” November 3, 2014 – DHS’s ICS-CERT identified a sophisticated malware that has compromised numerous ICS using a variant of the Black Energy malware. Black Energy variant targeted GE Cimplicity and Siemens WinCC SCADA programs. Is the Energy Sector Next? Is Next Now?

9 Who uses Big Data in the Energy Sector? Deepwater Exploration & Production (E&P) - Real time downhole data sensors – temperature, pressure, vibration, flowmeters and subsea control modules. Onshore E&P - Remote monitoring and control of well sites. Midstream Transportation - Remote detection and control systems. Monitoring high pressure/high temperature and corrosion. Maritime Transportation - Security and vessel traffic control, GPS aided functions and ECDIS navigation systems. Refining & Petrochemical - Processing of hydrocarbons/chemicals, predictive maintenance of equipment/machinery, supply chain and distribution chain. Is the Energy Sector Next? Is Next Now?

10 Enhanced Corporate Responsibility to Manage Risks for Cyber Attacks - US Perspective Executive Order Improving Critical Infrastructure Cybersecurity, 12 June Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0 National Institute of Standards and Technology (NIST), 12 Feb DHS/DOE Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (ONG – C2M2) – Version 1.1 – February DHS Insurance Industry Working Session Readout Report – Insurance for Cyber-Related Critical Infrastructure Loss: Key Issues – July SEC Commissioner Aguilar’s Addresses New York Stock Exchange Members Regarding Corporate Obligations Concerning Cyber Risks– June 2014.

11 Enhanced Corporate Responsibility to Manage Risks for Cyber Attacks - US Perspective Executive Order 13636, Improving Critical Infrastructure Cybersecurity Adoption of the Cybersecurity Framework (“Framework”) Market-based incentives to encourage the development of cyber insurance. Litigation risk mitigation for entities that adopt the Framework and meet reasonable insurance requirements. Legal benefits may include limited indemnity, higher burdens of proof, or limited penalties; case consolidations; case transfers to a single federal court. Insurance options could include a requirement for the purchase of private market liability insurance in order to apply for these liability protections and legal benefits. Executive Order 13636Executive Order 13636, 12 June 2013.

12 Enhanced Corporate Responsibility to Manage Risks for Cyber Attacks - US Perspective NIST - Framework for Improving Critical Infrastructure Cybersecurity Encourages development of voluntary standards and processes for industry concerning critical infrastructure to address cyber risks. Urges corporate management to focus on cyber risk management. NIST, Framework for Improving Critical Infrastructure Cybersecurity, Version 1, 12 Feb Framework for Improving Critical Infrastructure Cybersecurity

13 Enhanced Corporate Responsibility to Manage Risks for Cyber Attacks - US Perspective DHS/DOE Oil and Natural Gas Subsector, Cybersecurity Capability Maturity Model (ONG – C2M2) C2M2 program address the “unique characteristics of the oil and natural gas subsector.” C2M2 program can be used to: Strengthen cybersecurity capabilities in the ONG sector. Enable ONG organizations to effectively and consistently evaluate and benchmark cybersecurity capabilities. Share knowledge and best practices within the ONG sector as a means to improve cybersecurity. 104 references and comments on “risk management.” Oil and Natural Gas Subsector, Cybersecurity Capability Maturity Model (ONG-C2M2)Oil and Natural Gas Subsector, Cybersecurity Capability Maturity Model (ONG-C2M2), Version 1.1, Feb. 2014

14 Enhanced Corporate Responsibility to Manage Risks for Cyber Attacks - US Perspective DHS Insurance Industry Working Session Readout Report, Insurance for Cyber-Related Critical Infrastructure Loss: Key Issues, July Insurance for Cyber-Related Critical Infrastructure Loss: Key Issues

15 Enhanced Corporate Responsibility to Manage Risks for Cyber Attacks - US Perspective DHS Insurance Industry Working Session – July 2014 Round table meetings with insurance industry – Oct to Nov meetings ReportReport on energy sector insurance: Exclusion CL380 described as an exemption clause that is “… commonplace in property insurance written for energy sector companies.” Recognized the existence of several energy sector data sets that include failure scenarios that could assist in creating underwriting data templates.

16 Enhanced Corporate Responsibility to Manage Risks for Cyber Attacks - US Perspective SEC Commissioner Aguilar addresses New York Stock Exchange members regarding corporate obligations concerning cyber risks – June 2014 addresses

17 Enhanced Corporate Responsibility to Manage Risks for Cyber Attacks - US Perspective SEC’s Recommendations to New York Stock Exchange Members – June 2014 June 10, 2014 – SEC Commissioner Aguilar advised :advised That “ensuring the adequacy of a company’s cybersecurity measures needs to be a critical part of a board of director’s risk oversight responsibilities.” Best practices include the review and assessment of corporate insurance policies. From the SEC’s perspective, directors and officers of publicly traded companies have an obligation to review and assess the adequacy of insurance coverage that would respond to a cyber-attack. Ariel Yehezkel & Thomas Michael, Cybersecurity: Breaching the Boardroom, THE METROPOLITAN CORPORATE COUNSEL, April 2014.Cybersecurity: Breaching the Boardroom Directors and Officers (D&O) liability insurance policies often exclude coverage for failure to procure/maintain adequate insurance coverage.

18 Energy Industry’s Response to Threat of Cyber Attack Increased concern about insurance coverage for cyber attack/data breach. Oil and Natural Gas – Information Sharing and Analysis Center (ONG- ISAC) Members – Upstream, midstream and downstream energy companies and contractors. Goal – “[T]o provide shared intelligence on cyber incidents, threats, vulnerabilities, and associated responses present throughout our industry.” Anonymous information sharing through an ONG-ISAC secure web platform. Coordinated response among ONG-ISAC members. ABI Research projected costs to guard oil and gas infrastructure against cyber attacks will be $1.87 billion in 2018.

19 Insurance Coverage for Cyber Attacks on the Energy Sector – Where is it? Type of losses and policies that may be involved in a cyber attack: LossPolicy Property of the company or third partiesProperty/Liability Pollution damages/liabilityLiability/OEE Well control and re-drill expensesCOW/OEE Business interruption, contingent business interruption and lost or delayed production of company or third parties Property/Liability Loss of intellectual property, trade secrets and financial information Cyber Risk Remediating damage to computer systemsCyber Risk Bodily injury or death claims of employees or third partiesLiability Regulatory fines and/or penaltiesCyber Risk Shareholder suitsD&O

20 Coverage for Cyber Attack Under Available Policies Cyber Risk Policies Limited cyber-risk insurance policies provide coverage for first party and third party claims with relatively low limits ($10-25 million). Coverages: Forensic analysis, remediation of data systems, notification to customers, public affairs/public relations and notification to third parties. Loss of intellectual property, financial information, and proprietary data of the insured. London market coverages have provided some property damage and business interruption coverages. Property damage, environmental impairment and bodily injury/loss of life are not covered under most cyber risk policies.

21 Coverage for Cyber Attack Under Available Policies D&O Policies Provide some coverage to corporate management and the entity for securities claims related to alleged failures to mitigate cyber risks. Coverage for damages to property of the corporation or third parties will not be provided under most D&O policies. Many D&O policies have exclusions for cyber risks. D&O policies will not provide coverage for property damage, environmental impairment or business interruption. Many D&O policies exclude coverage for failure to procure and maintain adequate insurance coverage.

22 Coverage for Cyber Attack Under Available Policies Property Insurance Provides coverage for company’s physical assets and business interruption/contingent business interruption. Often excludes losses resulting from cyber risks/cyber attacks. US Courts are divided regarding whether damage to software/computer systems are “physical damage to tangible property.” American Gur. & Liab. Ins. Co. v. Ingram Micro, Inc., Civ TUC ACM, 2000 WL , (D. Ariz. 2000) (Corruption of electronic data was physical damage to tangible property); Lambrecht & Assocs., Inc. v. State Farm Lloyds, 119 S.W.3d 16 (Tex. App.— Tyler 2003, no pet.) (Damage to data is loss of tangible property). Ward Gen. Ins. Servs., Inc. v. Emp’rs Fire Ins. Co., 7 Cal. Rptr. 3d 844, 851 (Cal. Ct. App. 2004) (Loss suffered by plaintiff was a loss of information. Plaintiff did not lose the tangible material of the storage medium.)

23 Coverage for Cyber Attack Under Available Policies Upstream Energy Insurance Facilities Oil Insurance Limited (OIL) is a Bermuda-based mutual insurance program for the energy industry. Coverage includes property damage, control of well, redrill, and pollution coverage. Some degree of coverage for cyber attacks on its members – but not war risks. The aggregate limits of OIL coverage is $750 million per event. Chrysalis is a specialized excess insurance program underwritten by London market insurers. Provides coverage similar to those provided under OIL, including some coverage for cyber attacks. Chrysalis also provides up to $125 million per occurrence for cyber- attacks.

24 Coverage for Cyber Attack Under Available Policies Commercial General Liability Insurance (CGL) Property Damage – Coverage A Is damage to electronic data “property damage”? Magnetic Data, Inc. v. St. Paul Fire and Marine Ins. Co., 83 A.3d 664 (Conn. App. 2014) – electronic data erased from hard drive was intangible and not covered under “property damage” definition. After 2001, many policies exempted “electronic data” from “property damage” definition. After 2004, ISO wording excluded “[d]amages arising out of the loss of, loss of use of, damage to, corruption of, inability to access, or inability to manipulate electronic data.” “Electronic Data Liability” Endorsement reintroduced “electronic data” into the definition of “property damage.

25 Coverage for Cyber Attack Under Available Policies Commercial General Liability Insurance (CGL) Personal and Advertising Injury Liability – Coverage B “Personal and advertising injury” includes “Oral or written publication, in any manner, of material that violates a person’s right of privacy.” Coverage for loss of personally identifiable information (PII). Zurich American Insurance v. Sony Corporation, No (N.Y. Sup. Ct. Feb. 24, 2014). Court ruled that Coverage B of the CGL policy applied to publication of Sony customers’ confidential information. Because the disclosures were made by the hackers, and not Sony, the insurer had no duty to defend the insured or pay for damages. Netscape Communications Corp. v. Federal Insurance Co., 343 Fed. App’x 271 (9th Cir. 2009). SmartDownload software collected claimants’ internet usage and used information for advertising. Court found claims within “personal injury” coverage and ruled that insurer had duty to defend the insured. Court did not require a disclosure of PII to a third party.

26 Cyber Risk Exclusions ISO 2004 Electronic Data Exclusion ISO 2014 Data Breach Exclusions CL 380 Cyber Risk Exclusion NMA 2915 – Cyber Exclusion NMA 2914 – Electronic Data Endorsement A

27 ISO 2004 Electronic Data Exclusion and Definition CG (2004 CGL Form)

ISO Data Breach Exclusions CG

29 CL380

30 NMA 2915

31 Contractual Risk Allocation for Cyber Risks Cyber risk allocation scheme needs something more than “at law” contribution clause. “Knock for knock” scheme may not be applicable to damages arising from cyber attacks. Risk allocation based upon “emanation” or means of entry. Suitable for a “bring your own device” environment between operators and contractors? Representations/warranties/certifications that software/hardware/devices used in performance of services is free of any virus/malicious code/malware. Representations/warranties to promptly notify customer of discovery of any “cyber incidents” or compromised cyber security events prior to/after the performance of services. Requirements that contractor have liability insurance that would cover damages resulting from cyber attacks? No policy exclusions?

32 Insurance Coverage for Cyber Attacks/Cyber Risks in the Energy Sector - Path Forward Good News U.S. government is considering use of commercial, financial and legal incentives to: Encourage companies to implement measures to prevent cyber attacks. Encourage the creation of insurance programs to respond to cyber attacks. The energy sector and the insurance market have worked closely for years on conceptually challenging risks. Specialists in energy insurance and cyber security can provide the means to conduct risk assessments of companies/insureds. Existing risk assessment templates can be used to address cyber risks and create safeguards to prevent them. Bad News Insurance coverage for energy sector cyber attacks is still a nascent risk market. Unlike some other risks, cyber attacks continue to evolve at a rapid pace.

33 Glenn Legge For 30 years Mr. Legge has practiced in the areas of commercial litigation, including energy, marine, construction, insurance coverage and trade secrets disputes. He represents operators, contractors, service companies and insurers involved in onshore and offshore energy, construction, environmental and regulatory matters. Mr. Legge has tried numerous cases to verdict, has arbitrated commercial disputes through award and enforcement and has argued cases before Texas appellate courts in the 1st, 5th and 14th Districts, the Texas Supreme Court and the United States Court of Appeals for the Fifth Circuit. In the last four years he has had the honor of obtaining significant victories in two matters before the Texas Supreme Court involving onshore and offshore construction and insurance coverage disputes. You can contact Mr. Legge at Jeanie Tate Goodwin is a Senior Associate at Legge Farrow. Her practice includes maritime personal injury and casualty matters, as well as representing energy companies in complex, commercial litigation. In addition, she has substantial experience in insurance law, including both first party and third party coverage matters. In the first quarter of 2015, she will join Catlin’s legal department on secondment in London. You can reach Jeanie at Jacob Esparza is a Senior Associate in Legge Farrow that has represented energy companies and their insurers for nearly 10 years. He handles complex litigation involving contractual risk allocation issues in the on- and offshore energy industries. Mr. Esparza also successfully represents foreign and domestic insurers in coverage and bad faith litigation stemming from various commercial coverages, including energy, liability, property, cargo, motor carrier and business interruption. In 2014, Mr. Esparza was selected to the Super Lawyers "Texas Rising Stars" List for the Energy and Natural Resources, Insurance Coverage and Transportation/Maritime practices. You can contact Mr. Esparza at Authors

34 Why Your Corporate Insurance and Risk Management Program May not Respond to a Cyber Attack In House Counsel Summit Series November 6, 2014 Glenn R. Legge