Top Banner
24

2014 0311 Cyber Liability

Dec 24, 2015

Download

Documents

Roe Dan

arm
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 2014 0311 Cyber Liability
Page 2: 2014 0311 Cyber Liability

Cyber Risks

Page 3: 2014 0311 Cyber Liability

OVERVIEW

•  Exposures •  Stakeholders •  Assessment •  Prevention Strategies

Page 4: 2014 0311 Cyber Liability

TERMS

•  Cyber •  Data Breach •  Denial of Service •  Virus

Page 5: 2014 0311 Cyber Liability

CYBER FACTS

A hacker can operate from anywhere in the world. Organized crime rings operate worldwide 24/7.

Page 6: 2014 0311 Cyber Liability

What DATA is at stake?

•  Personal Identifiable Information –  Driver’s License –  Birth Date –  Social Security Number –  Financial Account Numbers –  Credit Card Numbers –  Personal Health Information

•  Financial Information •  Proprietary Information and Business Secrets

Page 7: 2014 0311 Cyber Liability

CYBER FACTS A breach can also result from:

•  REGULAR  E-­‐MAIL  •  ACCIDENTAL  E-­‐MAIL  •  IMPROPER  DISPOSAL  •  Laptop •  Mobile Device

Page 8: 2014 0311 Cyber Liability

Where is the Danger?

Page 9: 2014 0311 Cyber Liability

Are the Risks REAL?

563,656,459 •  50% have 1,000 employees or less •  26% were on companies with 11 to 100 employees

Page 10: 2014 0311 Cyber Liability

Compliance Law

As of September 1, 2012, only Alabama, Kentucky, New Mexico and South Dakota have no laws related to security breach notification

Page 11: 2014 0311 Cyber Liability

How Much Does a Data Breach Cost?

The average cost of a data breach in 2012 was:

$194 per lost customer record ($80 notifications + $114 lost business)

Additional Costs 1.  Public relations 2.  Technology changes and staff retraining 3.  Reward expenses 4.  Extortion demands 5.  Replacing stolen funds or securities 6.  Compliance Fines and Fees

Page 12: 2014 0311 Cyber Liability

STAKEHOLDERS

Page 13: 2014 0311 Cyber Liability

Administration

•  Needs to communicate that cyber security is a priority

•  Empower IT to find and implement solutions organization wide – Support financially – Listen to IT’s concerns and recommendations – Facilitate business process changes

•  Demand accountability

Page 14: 2014 0311 Cyber Liability

Information Technology

•  Security needs to be a priority •  Understand their own abilities and

limitations •  Need to be open to and value external

audit

Page 15: 2014 0311 Cyber Liability

ASSESSMENT

Page 16: 2014 0311 Cyber Liability

Assessment

•  The Cyber Liability Application •  Information Security Self-Assessment •  Information Technology Audit

Page 17: 2014 0311 Cyber Liability
Page 18: 2014 0311 Cyber Liability

PREVENTION STRATEGIES

Page 19: 2014 0311 Cyber Liability

Prevention Strategies

•  Implement Policies •  Train Employees •  Implement Encryption •  Backup •  Updates and Patches •  Content Controls

Page 20: 2014 0311 Cyber Liability

Solutions

•  Assess Risks •  Prevention Policies and Plans •  Cyber Liability Insurance

Page 21: 2014 0311 Cyber Liability

Examples of Gaps in Insurance Programs

        Property   General  Liability  

Professional  Liability   Execu@ve  Risk   Cyber  

Insurance  1st  Party   Physical  Damage  to  Data                           Virus/Hacker  damage  to  Data                           Denial  of  Service  ACack                           B.I.  Loss  from  IT  security  Breach                           IT  ExtorHon  or  Threat                      3rd  Party   TheI/Disclosure  of  Data                           AdministraHon  Privacy  Breach                           Technology  E&O                           Media  Liability  (electronic  content)                           Privacy  breach  expense/noHficaHon                           Damage  to  3rd  party  data                           Regulatory  Privacy  Defense  Fines                      

Coverage  Provided      Limited  Coverage      

No  Coverage      

Page 22: 2014 0311 Cyber Liability

Overview •  Exposures •  Stakeholders •  Assessment •  Prevention Strategies

Contact your Account Executive Questions?

Page 23: 2014 0311 Cyber Liability

Sources

•  State Data Security Breach Notification Laws, Mintz Levin, October 1, 2012 •  2012 US Cost of Cyber Crime Study, Ponemon Institute, October 2012 •  Secure Data Seminar, Apogee Insurance Group, September 29, 2011 •  I have a Data Breach webinar, OneBeacon Professional Insurance, March 20, 2012 •  How will you survive a Data Security Breach, Chubb Group of Insurance Company,

Brochure, www.chubb.com •  How much does a Data Breach Cost, Sendinc.com blog, September 17, 2012 •  Cyber Liability Insurance FAQs, Madison Risk & Insurance Services,

www.cyberliability.com •  Data Protection and Breach Notification Compliance Law, www.vormetric.com •  Threat Activities Trends, www.symantec.com

Page 24: 2014 0311 Cyber Liability

THIS POWER POINT PRESENTATION AND ANY MATERIALS DISTRIBUTED ARE FACT BASED GENERAL INFORMATION AND SHOULD NOT, UNDER ANY CIRCUMSTANCES, BE CONSIDERED SPECIFIC LEGAL ADVICE REGARDING A PARTICULAR MATTER OR SUBJECT. PLEASE CONSULT YOUR LOCAL ATTORNEY OR RISK MANAGER IF YOU WOULD LIKE TO DISCUSS HOW A LOCAL JURISDICTION DEALS WITH ANY SPECIFIC CIRCUMSTANCES YOU MAY BE FACING.