Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved. 4025 W. Peterson Ave. Chicago,

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
CSI 2005 Computer Crime Survey Put together by J. Scott, 2006 Using Graphics and Text from the Published CSI/FBI 2005 Crime Survey.
Cyber Insurance Today: Lots of Interest, Lots of Product Innovation, and Lots of Risk Richard S. Betterley, CMC Betterley Risk Consultants, Inc. Sterling,
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.

Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
Business Administration & Management Mr. Bernstein Insurance and Risk Reduction, pp June 5, 2015.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Key to the Future Chapter 2, Lesson 2 Warm-Up Questions CPS Questions Note for teacher: Use “Pick a Student” button in CPS.
General Awareness Training
Overview of Cybercrime
Insurance Coverage for IT Security Breaches International Technology Law Association San Francisco, CA – May 4, 2006 Steven Brower Stephan Oringher Richman.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Non Physical Business Interruption Malcolm Randles, Underwriter, Kiln Syndicate February 2011.
Business Continuity from an Insurance Perspective Presented by Jim Carter Manager, Risk & Insurance.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
AUGUST 25, 2015 Cyber Insurance:
Cyber Risk Insurance. Some Statistics Privacy Rights Clearinghouse o From 2005 – February 19, 2013 = 607,118,029 records reported breached. Ponemon Institute.
Entrepreneurship Mr. Bernstein Identifying Business Risks, pp , and Dealing with Risks, pp January 8-9, 2015.
W h y D o I N e e d C y b e r L i a b i l i t y I n s u r a n c e ?
CYBER INSURANCE Luxury or necessary protection?. What is a data breach? A breach is defined as an event in which an individual’s name plus personal information.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
Forensic and Investigative Accounting Chapter 3 Fraudulent Financial Reporting © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Carlsmith Ball LLP Cyber Issues For Lawyers Deborah Bjes October 22 nd, 2015.
Cybercrime What is it, what does it cost, & how is it regulated?
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Framework Chapter 1 Panko, Corporate Computer and Network Security Copyright 2002 Prentice-Hall.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Law Firm LLP | Cyber Insurance | July 16th, 2014 Page 1 Cyber Exposure Landscape "The single biggest threat still is people inadvertently bringing down.
DHS Publishes Report Saying Low but Persistent Risk of Cyber Attack on Energy Sector DHS REPORT ON ENERGY CYBERSECURITY April 6, 2016 | Ben Booker Source:
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
How can your Captive help you manage Cyber risks?.
Cyber Liability: New Exposures Presented by: Henriott Group © 2007, , Zywave Inc. All rights reserved.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Cyber Liability Insurance for an unsecure world
Cyber Insurance Risk Transfer Alternatives
Financial Institutions – Cyber Risk
Financial Technology in Cyber Risks
Cyber Insurance presentation for: The 2nd Anti Cybercrime Forum Beirut, 29th November 2016 Alexander Blom, Head of Financial Lines, AIG MENA.
E&O Risk Management: Meeting the Challenge of Change
Cyber Insurance – FFs & CHBs
Business Administration & Management
Identifying Business Risks, pp , and
Cyber Insurance Overview
Cyber Insurance: An Update on the Market’s Hottest Product
Andy Hall – Cyber & Tech INSURANCE Specialist
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
FAIR 2018 – Cyber Risks & Markets
Forensic and Investigative Accounting
Forensic and Investigative Accounting
Forensic and Investigative Accounting
Cyber Security: What the Head & Board Need to Know
Presentation transcript:

Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago, IL CCHGroup.com

Chapter 16Forensic and Investigative Accounting2 Reasons to Quantify Loss To report the crime to law enforcement. To report the crime to law enforcement. To recover damages under an insurance policy. To recover damages under an insurance policy. To record for internal purposes. To record for internal purposes.

Crime Survey The 2010 CSI Computer Crime and Security Survey based on 351 returned surveys determined that: 67.1 percent of respondents experienced malware infection compared to 2009’s 64.3 percent 16.8 percent experienced denial-of-service attacks, compared to 2009s 29.2 percent ; 11.4 percent experienced password sniffing, compared to 17.3 percent in ChapterForensic and Investigative Accounting3

Chapter 16Forensic and Investigative Accounting4 State Statutes Describing Losses The following factors are shown as remediable activities and loss classifications: –Verification costs to check systems (diagnosis–remediation). –Restoration costs to put systems back online (testing). –Market value or replacement value of the property destroyed or services. (continued on next slide)

Chapter 16Forensic and Investigative Accounting5 State Statutes Describing Losses –Lost profits. –Reasonable value of loss caused by “unavailability.” –Investigation costs. –Past or future losses. –Injury suffered. –Loss of computer time (lost productivity). –Cost of replacing lost data.

Chapter 16Forensic and Investigative Accounting6 Federal Identification of Damage Losses The federal government identifies the following damage losses in cyber attacks: –Responding to an attack. –Costs of making a damage assessment. –Time and costs of restoring the system. –Loss of revenues from the interruption. –“Other damages” related to an interruption of service.

Securities and Exchange Commission In October 2011, the Securities and Exchange Commission has issued a recommendation that potential attacks from cyber criminals need to be disclosed in financial statement footnotes. Chapter 16Forensic and Investigative Accounting7

Chapter 16Forensic and Investigative Accounting8 Examples of Tangible Losses Market value or replacement cost of property destroyed in attack. Market value or replacement cost of property destroyed in attack. External investigation costs. External investigation costs. Lost worker productivity. Lost worker productivity. Cost of replacing lost data. Cost of replacing lost data.

Chapter 16Forensic and Investigative Accounting9 Productivity Losses Productivity losses arise from the reduction of efficient, “normal” production of work due to an event such as a cyber attack.

Chapter 16Forensic and Investigative Accounting10 Examples of Intangible Losses Unavailability of a website. Unavailability of a website. Lost profits. Lost profits. General injury. General injury. Destroyed or lost information contained on compromised PCs. Destroyed or lost information contained on compromised PCs. Loss of optioned opportunities. Loss of optioned opportunities.

Chapter 16Forensic and Investigative Accounting11 Costs and Types of Insurance Coverage First-party liability coverage is for direct damage to the insured from a cyber attack. First-party liability coverage is for direct damage to the insured from a cyber attack. Third-party liability provides coverage from the negligent acts of the insured as, for example, when the insured’s computers are unknowingly used to launch an attack against a primary target. Third-party liability provides coverage from the negligent acts of the insured as, for example, when the insured’s computers are unknowingly used to launch an attack against a primary target. Premiums for these policies can cost $20,000 to $40,000 annually for coverage up to $50 million each. Premiums for these policies can cost $20,000 to $40,000 annually for coverage up to $50 million each.

Chapter 16Forensic and Investigative Accounting12 First-Party Cyber Insurance First-party cyber insurance usually includes coverage of losses from: –Malicious destruction or alteration of information. –Theft of data such as credit card numbers. –Lost business income up to 12 months after the attack. –Extortion from threats such as introducing viruses into a network. (continued on next slide)

Chapter 16Forensic and Investigative Accounting13 First-Party Cyber Insurance –Introducing fraudulent information into a network. –Defamation. –Cost to repair and replace data. –Unintentional virus transmission. –Denial of service attacks. –IP infringement from website squatters. –Illegitimate use of network. –Defacement of a website and related losses. (continued on next slide)

Chapter 16Forensic and Investigative Accounting14 First-Party Cyber Insurance –Coverage of extra expense incurred during a disruption. –External consultant fees. –Intellectual property infringement from the disclosure of trade secrets. –Rehabilitation expenses to reestablish the insured’s reputation and market share. –Crisis communication expenses with clients to provide assurances the system is reliable and safe.

Chapter 16Forensic and Investigative Accounting15 Seeking Insurance Coverage Qualifying for coverage Qualifying for coverage –Risk survey –Security audit What insureds should know about coverage What insureds should know about coverage –Third-party lawsuits –Intangible losses

Risk Evaluation and Coverage A risk evaluation determines how much a company should be charged for cyber insurance. For example, extensive and proper use of encryption and an updated and properly patched operating system would have the effect of reducing the cost of a policy. Chapter 16Forensic and Investigative Accounting16