Cyber Liability Insurance Why we have it & How it works

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Travelers CyberRisk for Insurance Companies
©2008 Perkins Coie LLP Game Industry Roundtable Privacy Developments for the Game Industry Thomas C. Bell September 24, 2008.
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Regulatory Issues in Campus Computing Privacy and Security in a Digital World Presented by David Gleason, Esq. University Counsel University of Maryland,
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Springfield Technical Community College Security Awareness Training.
Enterprise Risk Management Services for State & Local Government Drew Zavatsky Section Manager, Loss Prevention Program Office of Risk Management (360)
Finance and Governance Workshop Management of a Data Breach James Webster Hiscox Insurance.
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
Presented by: Jamie Orye, JD, RPLU Beazley Group Pennsylvania Association of Mutual Insurance Companies Annual Spring Conference March 12, 2015.
Recent Trends and Insurance Considerations March 2015
Security Controls – What Works
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
BROTHERS, HAWN & COUGHLIN, LLP 4-STEP PROGRAM TO HIPAA COMPLIANCE.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Cyber Liability Insurance Why we have it & How it works DRAFT – Version 3 May 28, 2015 SBCTC – BAR Commission Meeting Doug Selix, MBA, CISSP, CISM, PMP.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
NEFEC - Cyber Liability MICHAEL GUZMAN, ARM ARTHUR J. GALLAGHER & CO.
Overview of Cybercrime
Electronic Records Management: What Management Needs to Know May 2009.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
AUGUST 25, 2015 Cyber Insurance:
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Cyber Risk Insurance. Some Statistics Privacy Rights Clearinghouse o From 2005 – February 19, 2013 = 607,118,029 records reported breached. Ponemon Institute.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
Eleventh National HIPAA Summit 5.04 Security Incident Response – What to do if a breach occurs and how to mitigate damages Chris Apgar, CISSP.
Matt Foushee University of Tulsa Tulsa, Oklahoma Cyber Insurance Matt Foushee University of Tulsa Tulsa, Oklahoma.
Cyber-insurance coverage: do you have it? Robert E. Sumner, IV, Esq. and Tosh Siao of Willis Group September 17, 2015.
Session 7 Compliance failure policy. 1 Contents Part 1: COLP and COFA duties Part 2: What do we have to comply with and why does it matter? Part 3: Compliance.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
New A.M. Best Cyber Questionnaire
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Restaurant 1. 2 There are several different types of restaurant classifications, including: Family Style Fine Dining Fast Food Buffet.
The Pitfalls of the Small Business Owner Protect Your Assets!
Presentation by Laura Possessky, Esq. Gura & Possessky, PLLC Washington, DC (c) 2015 Gura & Possessky, PLLC1.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Retail & Service 1. 2 The Retail & Service industry encompasses a wide variety of businesses. This segment includes: Businesses engaged in selling goods.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Cyber Insurance - Risk Exposures and Strategic Solutions
Cyber Insurance Risk Transfer Alternatives
New A.M. Best Cyber Questionnaire
Financial Institutions – Cyber Risk
Managing a Cyber Event Steven P. Gibson President
Responding to a Data Breach 360° of IT Compliance
Cyber Insurance Overview
Reporting personal data breaches to the ICO
Cyber Issues Facing Medical Practice Managers
Red Flags Rule An Introduction County College of Morris
Cyber Trends and Market Update
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
By Joseph Carnevale, CIP Partner & Director of Sales
Cyber Security: What the Head & Board Need to Know
School of Medicine Orientation Information Security Training
Presentation transcript:

Cyber Liability Insurance Why we have it & How it works Doug Selix, MBA, CISSP, CISM, PMP - DES Office of Risk Management April 9, 2015 SBCTC – IT Commission Meeting

Agenda Cyber Liability Incidents Cyber Liability Risks Cyber Liability Risks Exposure What Happens if “it” Happens? Cyber Liability Insurance

Key Definitions Cyber Security is defined as: “Measures taken to protect a computer or computer system (as on the Internet) and the data they contain against unauthorized access or attack.” Cyber Risk is defined as: “The possibility that data will end up in the possession of a party who is not authorized to have that data and who can use it in a manner that is harmful to the individual or organization that is the subject of the data and/or the party that collected and stored the data.” Doug’s Version - What happens when Cyber Security measures are not effective in protecting an organizations electronic data or computer systems from unauthorized access or attack.”

Key Definitions Cyber Risk Loss Exposure is defined as: “Any condition that presents the possibility of financial loss to an organization from property, net income, or liability losses as a consequence of advanced technology transmissions, operations, maintenance, development, or support.” Doug’s Version - Costs arising from 1st party damages and 3rd party liabilities resulting from the use of your computer systems.

Why We Need Cyber Liability Insurance Switch Gears Why We Need Cyber Liability Insurance Stuff Happens! Not a matter of “if”, but a matter of “when”

Incidents - The Big Picture Significant Data Breach Events The Open Security Foundation's DataLossDB gathers information about events involving the loss, theft, or exposure of personally identifiable information (PII). Source: www.InformationisBeautiful.com

Incidents - The Big Picture Significant Data Breach Events The Open Security Foundation's DataLossDB gathers information about events involving the loss, theft, or exposure of personally identifiable information (PII).

Breaches in Academia Source: www.InformationisBeautiful.com

Incidents - Education Instructional Data Breach Events Maricopa Community Colleges – as of April 2013 2.4 Million Student and Employee Records $12 Million cost IT Director fired for dereliction of duty 2 Lawsuits Administrator of the Courts – May 2013 1 Million WDL and 160K SSN’s Web site hacked University of Washington – 2013 90,000 patient records. email based attack Eastern Washington University – 2009 130,000 student records. Hack attack

What Risks are Covered by Cyber Liability Insurance? Switch Gears What Risks are Covered by Cyber Liability Insurance?

Cyber Liability Risks Any condition that presents the possibility of financial loss as a consequence of using advanced technology. Sample Adverse Impacts Harm to Operations Harm to Assets Harm to Individuals Harm to Other Organizations Harm to the Nation Source: NIST SP 800-30

Cyber Liability Risks Cost to comply with Breach Notification Regulations RCW 42.56.590 FERPA HIPAA PCI IRS Publication 1075

Cyber Liability Insurance Common Coverage Areas Information Security & Privacy Liability Privacy Notification Costs Regulatory Defense and Penalties Website Media Content Liability Cyber Extortion First Party Data Protection First Party Network Business Interruption See APIP Document

Cyber Risk – Devils in the Detail Source: NIST SP 800-30, NIST SP 800-39

Cyber Liability Insurance Switch Gears Cyber Risk Exposure How Much Cyber Liability Insurance do you need?

Risk Exposure – Mostly About Data Data that can cause financial harm to your agency “if” it is not kept secure, includes: Personally identifiable information (RCW 42.56.590) Electronic personal health information (HIPAA Security Rule) Credit card information (PCI Data Security Standard) Bank account information used to process electronic fund transfers or payments IRS tax information (IRS 1075) Student education information (FERPA) Data protected by attorney client privilege Criminal justice information (FBI CJIS standards) Proprietary information (agreement, contract, or license)

Risk Exposure – Cost Factors Example: Costs associated with breach notification $3 per record minimum cost – EWU 2009 breach actual cost ~$107 – Estimated public sector cost per record in data breach (Ponemon Institute 2014 US Cost of a Data Security Breach Report)

ORM 2014 Data Survey Results? SBCTC & Community College View As of 6/3/2014

Estimating Your Cyber Risk Exposure Compute Cyber Liability Risk Exposure Need to Document Your Confidential Data Use Risk Assessment Worksheet See Handout No. 1 Call Me, we can do this together.

What Happens if “it” Happens? Security Event Incident Response Switch Gears What Happens if “it” Happens? Security Event Incident Response

Incident Response Team Follows the Plan Follow Your Plan, Right? Incident Response Team Follows the Plan Who’s Got The Plan?

“Good” Security is Planned Use the NIST Cyber Security Framework http://www.nist.gov/cyberframework/ Breach Response

Or Maybe Not We can deal with whatever comes up…..

“Good” Computer Security Incident Response is also Planned NIST – Computer Security Incident Handling Guide (SP 800-61 R2)

The OCIO Has a Plan IT Security Incident Communication Policy Agencies shall report all IT security incidents to the OCIO CTS Security shall investigate to determine degree of severity and assist with mitigation CTS Security shall notify the OCIO (if required) OCIO will convene a Security Incident Communication Team (if required) OCIO will authorized coordinated release of public notification with breached agency(s) (if required)

The OCIO Has a Plan Step 3. - CTS Security shall notify the OCIO (if required) CTS Security will notify OCIO and AGG for OCIO At this time the CTS Security Officer, in conjunction with the Washington State Office of the Attorney General, will also provide the CISO with an informed opinion as to whether or not the severity of the incident’s impact warrants public notification as required by law

Most IT/IR Guidance Stops Short Focus tends to be on putting out the flame.

Fire is out, who cleans up the mess? What we have so far: Policy to prevent breaches by implementing security best practices Resources (CTS Security) to react to the breach. State policy to manage public notification when breaches do occur. Fire is out, who cleans up the mess?

What we Don’t Have: A State level plan for dealing with the impact from a breach that includes: Access to highly skilled legal and public relations resources to advise the OCIO, AGO, and agency leadership during a breach event. Access to risk financing resources to recover losses from the breach Access to production capacity to do the work necessary to comply with breach notification regulations

Today Who cleans up the mess? How will they do it? The Affected Agency Small breach – Deal with it internally Big breach – Depends?????????? May have Cyber Liability Insurance May not – have to dip into reserves or ask for budget

Cyber Liability Insurance? Switch Gears Cyber Liability Insurance? (Provides Response Resources)

Cyber Liability Insurance Current Policy (APIP) - “Alliant Property Insurance Program” Agency must be on the State Master Property Insurance Policy to have APIP Cyber Liability Insurance Aggregate limits apply $25M for APIP Pool $2M for State of Washington

Warning Not All Colleges and Universities have this policy

APIP Cyber Liability Insurance Cyber Liability General Coverages ($100K Deductible) $2M Information Security & Privacy Liability $500K Privacy Notification Cost, $1M if carrier's preferred vendors are utilized $2M Regulatory Defense and Penalties $2M Website Media Content Liability $2M Cyber Extortion Loss $2M Data Protection Loss and Business Interruption Loss

APIP Details Sent Details to your Risk Manager And to You

Montana Lessons Learned May 2014 HIPAA Breach APIP Cyber Liability Insurance Worked Response Services Worked Rapid Response Event Management Forensic Analysis Root Cause Determine Data Exposure Legal Services Public Relations Services Notification Production Call Center Operation Manage Internal Reporting (Gov) 1.3 Million Dept. of Health Patient Records. Baker Hostetler

We have a Plan See Handout No. 2

How will APIP Work for you? Based on decision in Step 3 of the OCIO Incident Communication Plan AGO will notify the Office of Risk Management if we need to file a claim with our Cyber Liability Insurance carrier. Cyber Liability Insurance will provide resources to the Agency

Is There State Level Cyber Liability Insurance No, APIP is all we have 2014 – Decision Package for $30M CL Policy Did not make it into Governor’s Budget ASK ME “WHY” OCIO IT Budget Requests Prioritized for FY 15-17

Academic Point Insurance is about “Risk Finance” Risks can be Avoided, Reduced, Accepted, or Transferred. Insurance is how we transfer Financial Risk Exposure Cyber Liability Insurance is not a Technology Topic, it is a Finance Topic

Cyber Insurance Lumped With IT Proposals Next to Last Priority

Can Your Agency Buy More Cyber Liability Insurance? Switch Gears Can Your Agency Buy More Cyber Liability Insurance?

Additional Cyber Liability Insurance is Available Each Agency must decide how much is needed based on your Risk Exposure Agency completes an application Get application from Office of Risk Management (ORM) Return to ORM, ORM Submits to Broker Broker will develop a quote Advantages: No aggregate Limits Lower retention possible Sized to fit the agency risk exposure Example: CWU AIG Quote ($3M for $33K, $5M for $44K)

We need to measure your Cyber Liability Risk Exposure Next Steps We need to measure your Cyber Liability Risk Exposure Send me your completed spreadsheets IT Commission could recommend more Cyber Liability Insurance Each College buy their own policy Buy one policy for all 34 Colleges Call me if you need help telling this story to your management

Questions Thank you!

Cyber Liability Program Doug Selix, CISM, CISSP, PMP Cyber Liability Program Manager Department of Enterprise Services Office of Risk Management Office Phone: 360-407-8081 Email: doug.selix@des.wa.gov