OESAI COMPREHENSIVE GENERAL INSURANCE TECHNICAL TRAINING.

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Adware and Spyware. Objectives u Define terms, scope, and motivation u Discuss impact (personal and business) u Review basic technical aspects u Provide.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Crime and Security in the Networked Economy Part 4.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Securing Information Systems
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Information Security OECD, April 2001 International Computing Centre Managing Information Security Ed Gelbstein, International Computing Centre, Geneva.
Defining Security Issues
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
C8- Securing Information Systems
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Protecting Your Organization Identity Theft and Data Breach.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
By Alex Mayak.  What is spyware?  History of spyware.  What effect does spyware have on your computer?  What spreads spyware?
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Cyber Liability Insurance for an unsecure world
Securing Information Systems
Cyber Insurance Risk Transfer Alternatives
Securing Information Systems
Various Types of Malware
Data Compromises: A Tax Practitioners “Nightmare”
How to Get Rid of Online Threats Impacting your Computer Device?
Securing Information Systems
I have many checklists: how do I get started with cyber security?
Risk of the Internet At Home
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
Ethics, Part 2 Chapter 5 pp National Income Tax Workbook™
Chapter 9 E-Commerce Security and Fraud Protection
INFORMATION SYSTEMS SECURITY and CONTROL
Forensic and Investigative Accounting
Cyber Security: What the Head & Board Need to Know
G061 - Network Security.
Presentation transcript:

OESAI COMPREHENSIVE GENERAL INSURANCE TECHNICAL TRAINING

Cyber Insurance OESAI COMPREHENSIVE GENERAL INSURANCE TECHNICAL TRAINING Ezekiel Macharia Group Actuary - Jubilee Holdings Limited Day 2, Tuesday 10th November, 2015

AGENDA Cyber Risk & Cyber Risk Insurance Product Development Life Cycle – Demand Research & Pricing – Underwriting & Policy Terms – Claim Underwriting Conclusion

Insert Pictures no OESAI background Cyber Risk any risk of financial loss, disruption or damage to the reputation of an organisation from some sort of failure of its information technology systems (includes networks & the internet).

Insert Pictures no OESAI background Key Insurable Cyber Risks Theft: – Identity theft – Theft of digital assets Business interruption – Lost Income – Recovery of damaged data records – Reputational damage – Cost of Credit Monitoring of impacted clients Malware & Human Error (bugs) Legal suits alleging trademark/copyright infringement

Cyber Risk: Malware Software that is intended to damage or disable computers (systems) Malware (Malicious Software) COMMON TYPES OF MALWARE NameDescriptionExampleFunction Worm Exploit vulnerability of operating systems & spread without human intervention Infected sSpread & delivery payloads (most common) Trojan Trick user that they are using legitimate software Fake installation fileUsed to install other malwares Virus Software capable of copying itself and spreading to other computers (need human intervention) Script filesSpreading itself and carrying other malware AdwareAutomatically delivers advertsPop up AdsAnnoying/Deliver Spyware Bot Automatically perform a specific operation BotNets & SpambotsCo-ordinated attacks BugFlaw in system designHuman ErrorAllow attackers to bypass user authentication Ransomware Hold a computer captive - restrict user access Encrypted files/Locked down systemRansom to pay creator of malware Rootkit Remote access or control without detection BackdoorStealth entry to steal/alter/install or control Spyware Spying on user activity without knowledge Keystrokes collectorActivity monitoring & data harvesting

Case Study Kenya: Top Malware Attacks 79% of malicious software attacks in Kenya are worms Virus attack is only 2% Source: Technology Service Provider of Kenya Technology Service Providers of Kenya (TESPOK) ( ) tracks malware attacks in Kenya

Case Study Kenya: Top Malware Sources Top malware cyber attacks in Kenyan IT infrastructure are from China & USA sources (IP address) Attackers use sophisticated tools Source: Technology Service Provider of Kenya Attackers are international – any criminal in the world with an internet connection can now attack your clients business

Product Development? Demand Research: Is there need for cyber risk insurance? Pricing

Is there need for cyber risk insurance?

How developed is Cyber Security in OESAI member countries? Report developed by International Telecommunication Union (ITU) Key indicators for cyber security development are: Legal Technical capacity Organizational Capacity Building Cooperation Source: GLOBAL Cybersecurity Index & Cyberwellness Profiles Report 2015

Case study: Tanzania Cyber Crimes Bill (2015) Data Espionage Obtain data without permission Pornography Dissemination Publication of False Information Information – data/facts in form of pictures/text/symbols Racist/Xenophobic Material Publication or dissemination Unsolicited Messages Sms/ /Ads?? Cyber Bullying Bullying online Violation of Intellectual Property Infringement on commercial / non-commercial basis Laws supporting Insurable Risk Liability

Pricing Cyber Risk Strength of Security System Likelihood of intrusion Risk Management Culture Control in place & role of compliance & audit GSI Index Macro factors Frequency Severity Disaster Recovery Ability to recover from attack Rating of Service Providers Reliability of cloud providers, backup providers, website, etc Legal Fees & Fines IT Staff Costs Data restoration PR & Marketing Costs Extortion Customer Support Lost Income

Underwriting Cyber Insurance Policy Terms Underwriting considerations

Policy Terms Legal Liability Not complying with privacy laws Crisis Management Costs Informing customers, public relations & adverts Data Extortion Ransom Payment First Party Risks Third Party Risks Loss of Income As a result of network failure & downtime Data Recovery IT Staff overtime, data retrieval & verification Security Liability Liability arising from breach of security Multimedia Liability Liability arising from insured’s internet, advertising & marketing activities Professional Liability Liability arising out of negligence in providing IT Services

Underwriting considerations Business – Type of business – Size of business – Scope of the business Number of customers Multimedia – Presence on the Web – Data collected and stored Enterprise Risk Management (ERM) techniques applied by the business to protect its computer network and its assets. – Risk management procedure & culture Don’t tell anyone!! Non-disclosure of cyber risk policy

Claim Management In addition to traditional claim management, the insurer may want to hire Third Party IT experts to review the claims – post insurance underwriting

Claims Underwriting Comparing capacity of the insured at policy purchase date and claim date (moral hazard) – Ability of employees and others to access data systems – Utilization of antivirus and anti-malware software – Frequency of updates – Performance of firewalls Claim incidence details compared to risk-management techniques applied by the business to protect its network and its assets – what failed. Utilization of disaster response plan (DRP) when the claim occurred to the business’s networks, website, physical assets and intellectual property.

Conclusion Cyber risk is an emerging risk in the world Legal framework for insurable legal liability is generally under development across east & southern African countries There is demand for cyber risk insurance Where pricing data is not available – proxies can be developed Underwriting will depend on risk management and culture of the client

? QUESTIONS