CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © 2014 CUNA Mutual Group, All Rights Reserved. Understanding Cyber Insurance.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Travelers CyberRisk for Insurance Companies
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
“This workforce solution was funded by a grant awarded under Workforce Innovation in Regional Economic Development (WIRED) as implemented by the U.S. Department.
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
Recent Trends and Insurance Considerations March 2015
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Insurance. Business Insurance Running a small business involves a significant investment. Business insurance protects your investment by minimizing financial.
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Commercial Insurance Underwriting University of Illinois Urbana – Champaign Finance 230.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
Commercial Insurance Underwriting University of Illinois Urbana – Champaign Finance 230.
Why are Small and Mid-Size Companies Easy Targets for Hackers, and What can You do to Protect Yourself? 2/11/2015 Asher Dahan.
NEFEC - Cyber Liability MICHAEL GUZMAN, ARM ARTHUR J. GALLAGHER & CO.
1 CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © CUNA Mutual Group 2010 Alaska Credit Union League Annual Meeting.
Confidential and proprietary to U.S. Bank 1 Corporate Payment Systems Adwebportal Training.
Software License Agreement Negotiation 101 Ray Hsu, C.P.M. Assistant Director, Procurement Services University of Washington.
Agritourism 101 Workshop Overcoming the Insurance Barriers Related to an Agritourism Business.
NYSTA 2012 Annual Conference Telcom Insurance Group Presented by: Joyce Hermann, AU, CISR Sr. Account Executive Insure IT, Manage IT But Never Ignore IT…
Business Continuity from an Insurance Perspective Presented by Jim Carter Manager, Risk & Insurance.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
R ed F lag R ule Training for the Medical Industry © Chery F. Kendrick & Kendrick Technical Services.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Cyber Security Nevada Businesses Overview June, 2014.
Preventing a Sensitive Data Loss: Laptops Marc Scarborough.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Matt Foushee University of Tulsa Tulsa, Oklahoma Cyber Insurance Matt Foushee University of Tulsa Tulsa, Oklahoma.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Chapter 51 Insurance Law McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
1 CONFIDENTIAL ©2015 AIR WORLDWIDE New Approaches for Managing Cyber Risk.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
The Pitfalls of the Small Business Owner Protect Your Assets!
Data Security Survival Skills for 21 st Century Evaluators Teresa Doksum & Sean Owen October 17, 2013.
Prepared By: John Marshall, CRM, ERMCP, CIC, AAI Jenny Jacobsen, JD Cyber Liability Update April 21, 2016 Welcome.
CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © 2016 CUNA Mutual Group, All Rights Reserved. Boost Charitable Donations.
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Computer Security and the “H” word Glen Klinkhart, CEO Mike Messick, CTO.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Legal Requirements for Becoming a Licensed Freight Broker LogisticsAcademy.org LinkedIn YouTube Google+
Cyber Risk Management and Insurance
Cyber Insurance - Risk Exposures and Strategic Solutions
Cyber Liability Insurance for an unsecure world
Cyber Insurance Risk Transfer Alternatives
Breaking Down Cyber Liability
John A. Wright, CEO WIPFLI Client Appreciation June 8, 2017
Click here to advance to the next slide.
Gift Card Risk Mitigation – Presentation A
Affordable Car Insurance Lexington SC
David Lodwick, CIC, CRM Director of Trust Services
Responding to Intrusions
UNDERSTANDING INSURANCE: Risk Management in a High-Risk Environment
Chapter 3: IRS and FTC Data Security Rules
Society of Risk Management Consultants Annual Conference
Overview of Insurance Operations
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Cyber Exposures The Importance of Risk Identification and Transfer
By Joseph Carnevale, CIP Partner & Director of Sales
Business Continuity Plan
Cyber Security: What the Head & Board Need to Know
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © 2014 CUNA Mutual Group, All Rights Reserved. Understanding Cyber Insurance Connecticut Cybersecurity Basics Conference Jonathan Moore, CIC, CRM, AAI Corporate Property and Casualty Specialist, East Region September 14, 2015

What is the risk? Data – Personally Identifiable Information –Name, SSN, DOB, Biometric info, etc. –Electronic data –Hard (paper copy) data –Corporate confidential info –State and federal laws apply

Let’s analyze the exposure Add up these numbers… –Number of members –Number of former members –Number of employees –Number of former employees –Joint owners (that are not counted as members) –Indirect applications – that do not count as members

Who’s causing the loss at CUs? Source: Beazley Insurance Company, Inc. – 1300 CU’s protected by Beazley.

What are we worried about? Cyber thieves? –For CU’s, and many industries, less than 20% of losses Your staff! –Root cause of most losses Source: Beazley Insurance Company, Inc. - Since 2009, have handled almost 3000 claims.

Controls IT – fraud prevention software/hardware, encryption, etc. Staff training - “don’t do…”, managing passwords, etc. Testing staff Website reviews Purchase a cyber policy

What can I get covered? Standard - $1-10m liability policy –Sublimits ($100k-$500k) for legal, call center, forensic, mailing, credit monitoring, public relations –Erodes the liability limit Enhanced - $1-$10m liability policy –Insure a number of records separately with NO dollar limit to cover the notifications, call center and credit monitoring –Separate coverage limit for legal, forensic, public relations expenses –These do not erode the liability limit Compare each policy for limit structure and service level.

Disaster recovery assistance Type A – here’s your money (after you pay for the loss), have a nice day! –Mostly reimbursement type policies Type B – here’s a good company that we suggest. Call them to help you recover. –Both reimbursement and pay on behalf Type C – let us help you manage through the recovery process, we will line up everything for you. –Pay on behalf –Keeps cost low, efficient, vested interest Evaluate the experience level with handling claims and recovery assistance with each carrier review.

What we’ve seen Full breaches –Accidentally lost back up –Clicked on link, malware exposed later Other breaches –Marketing campaigns –Statements going to wrong people –Accidental s –Rogue employees

QUESTIONS?? Thank You!