Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Travelers CyberRisk for Insurance Companies
Presented at: Ctuit Software and Lathrop & Gage LLP Food & Hospitality Roundtable San Francisco, CA April 29, 2013 Presented by: Leib Dodell, Esq.
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
Cyber Insurance Today: Lots of Interest, Lots of Product Innovation, and Lots of Risk Richard S. Betterley, CMC Betterley Risk Consultants, Inc. Sterling,
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
NEFEC - Cyber Liability MICHAEL GUZMAN, ARM ARTHUR J. GALLAGHER & CO.
Overview of Cybercrime
©2015, Amy Stewart PC Title Here Cyber Insurance: The Future is Now Texas Lawyer In-House Counsel Summit May 8, 2015 Texas Lawyer In-House Counsel Summit.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Non Physical Business Interruption Malcolm Randles, Underwriter, Kiln Syndicate February 2011.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
AUGUST 25, 2015 Cyber Insurance:
Cyber Risk Insurance. Some Statistics Privacy Rights Clearinghouse o From 2005 – February 19, 2013 = 607,118,029 records reported breached. Ponemon Institute.
CYBER INSURANCE Luxury or necessary protection?. What is a data breach? A breach is defined as an event in which an individual’s name plus personal information.
What Keeps Your Board Up at Night? Sylvia Kerrigan, Exec. VP, General Counsel & Secretary – Marathon Oil Sean Gorman, Partner – Bracewell & Giuliani.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Matt Foushee University of Tulsa Tulsa, Oklahoma Cyber Insurance Matt Foushee University of Tulsa Tulsa, Oklahoma.
Cyber-insurance coverage: do you have it? Robert E. Sumner, IV, Esq. and Tosh Siao of Willis Group September 17, 2015.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Carlsmith Ball LLP Cyber Issues For Lawyers Deborah Bjes October 22 nd, 2015.
A PM’s Guide to Surviving A Data Breach. Compliance: PCI QSA and PCI Gap Analysis FISMA HIPAA SSAE 16 GLBA, Red Flags Response Incident Response and Disaster.
1 CONFIDENTIAL ©2015 AIR WORLDWIDE New Approaches for Managing Cyber Risk.
New A.M. Best Cyber Questionnaire
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Prepared By: John Marshall, CRM, ERMCP, CIC, AAI Jenny Jacobsen, JD Cyber Liability Update April 21, 2016 Welcome.
P RESENTED B Y DAVIS WRIGHT TREMAINE LLP T-MOBILE USA, INC. KROLL W HEN, N OT I F, THERE IS A CYBER SECURITY BREACH AND THE ISSUE OF CYBERSECURITY INSURANCE.
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber: risk without borders Airmic 2016 Harrogate International Centre Tuesday 7 th June 2016.
How can your Captive help you manage Cyber risks?.
Cyber Risk Management and Insurance
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Cyber Insurance - Risk Exposures and Strategic Solutions
Cyber Liability Insurance for an unsecure world
Cyber Insurance Risk Transfer Alternatives
Hot Topics in the Financial Industry: Cybersecurity
New A.M. Best Cyber Questionnaire
Financial Institutions – Cyber Risk
Financial Technology in Cyber Risks
E&O Risk Management: Meeting the Challenge of Change
Managing a Cyber Event Steven P. Gibson President
Cyber Insurance – FFs & CHBs
Information Technology Sector
Can Cyber Insurance Stand in the Data Breach
Cyber Insurance Overview
Cyber Insurance: An Update on the Market’s Hottest Product
I have many checklists: how do I get started with cyber security?
Andy Hall – Cyber & Tech INSURANCE Specialist
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Cyber Exposures The Importance of Risk Identification and Transfer
Cybersecurity compliance for attorneys
John Carlson Senior Director, BITS
Forensic and Investigative Accounting
Cyber Security: What the Head & Board Need to Know
Presentation transcript:

Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association

Agenda Cyber Risk Value Proposition What is Available Underwriting Topics What You Need to Know

Cyber Risk

Cyber Risk & Cyber Insurance “Cyber Risk” – “any risks that emanate from the use of electronic data and its transmission, including technology tools such as the internet and telecommunications networks. It also encompasses physical damage that can be caused by cyber attacks, fraud committed by misuse of data, any liability arising from data storage, and the availability, integrity and confidentiality of electronic information – be it related to individuals, companies, or governments.” 1 1 CRO Forum, Cyber Resilience Paper at 5 (December 2014) 2016 Cyber Insurance Buying Guide. Financial Services Sector Coordinating Council for Critical infrastructure Protection and Homeland Security

Almost 43 million cybersecurity incidents detected in 2014 – 40% increase over – increased another 38%. 3 Included: –Disruption of Business- Legal Penalties –Erosion of Customers- Loss of Revenue –Forensic Investigation- Customer Notification –Regulatory Fines- Attorney Fees –Brand and Reputational Damage –Loss of Intellectual Property –Exposure of Sensitive or Confidential Personal and Business Information 2PwC, Managing Cyber Risk In an Interconnected World: Key FInding from The Global State of Information Security Survey 2015 at 7 (Sept 30, 2014) 3PwC, Turnaround and Transformation in cybersecurity: Key FInding from The Global State of Information Security Survey 2016 at 2 (September 2015) 2016 Cyber Insurance Buying Guide. Financial Services Sector Coordinating Council for Critical infrastructure Protection and Homeland Security

Insurance has responded with a variety of products. Main Types of Coverage: –Data Privacy –Liability Coverage for Loss or Breach of Data –Remediation Cost Coverage Customer Notification Forensic Investigation –Regulatory Fines and other Penalties 2016 Cyber Insurance Buying Guide. Financial Services Sector Coordinating Council for Critical infrastructure Protection and Homeland Security

Other Types of Coverage –Costs and Liability Arising out of Cybersecurity Incidents NOT involving Data Breaches –Business and Contingent Business Interruption –Cyber Extortion –Media Liability Brokers can help find appropriate coverages. Create “towers” of insurance – and adding “excess” layers. 4 DO NOT expect your traditional property or liability policy to cover Cyber Losses! 4 Willis Re, Marketplace Realities 2015: Spring Update (April 2015) 2016 Cyber Insurance Buying Guide. Financial Services Sector Coordinating Council for Critical infrastructure Protection and Homeland Security

Value Proposition

Holistic Response Risk Mitigation Response / Recovery Risk Transfer –Many organizations lack awareness about cyber insurance –Why? 2016 Cyber Insurance Buying Guide. Financial Services Sector Coordinating Council for Critical infrastructure Protection and Homeland Security

Reasons to Consider Cyber Insurance Value on cyber risk Underwriting process can help identify gaps and improvement opportunities Inclusion of risk mitigation tools & incident response Cyber Insurance Buying Guide. Financial Services Sector Coordinating Council for Critical infrastructure Protection and Homeland Security

What is Available

How to Begin? Evaluate potential risk exposure –What information is used? –What are the ramifications if the information is compromised? –What steps have already been taken? How much insurance? –What is your risk appetite? –What type of insurance? 2016 Cyber Insurance Buying Guide. Financial Services Sector Coordinating Council for Critical infrastructure Protection and Homeland Security

First Party Coverage -Crisis Management & Identity Theft Response -Cyber Extortion -Data Asset Protection Third Party Coverage –Network Security Liability –Privacy Liability Most CGL Policies will NOT cover losses as a result of Data Breach Cyber Insurance Buying Guide. Financial Services Sector Coordinating Council for Critical infrastructure Protection and Homeland Security

Underwriting Topics

The Underwriting Process a.k.a. “Get Your House in Order” Dedicated Information Security Resources Information Security Policies and Procedures Employee Education Incident Response Planning Security Measures Vendor Management Board Oversight *Tip – Ask the underwriters for a list of questions prior to the discussion Cyber Insurance Buying Guide. Financial Services Sector Coordinating Council for Critical infrastructure Protection and Homeland Security

What You Need to Know

What to be Aware of When Shopping Policy Construction – Insuring Agreement –When is coverage triggered? –When is notice to the insurers required? –How are breach counsel and vendors selected? *Tip – Only buy coverage you NEED 2016 Cyber Insurance Buying Guide. Financial Services Sector Coordinating Council for Critical infrastructure Protection and Homeland Security

What to be Aware of When Shopping Key Exclusions / Sublimits –Portable electronic device exclusion –Intentional Acts Exclusion –Nation / State, Terrorism, Cyber Terrorism Exclusions / Acts of God –Negligent Computer Security Exclusion –Sublimits –Post-Breach Services –Vicarious Liability / Vendors –Other Policy Considerations *Tip – Only buy coverage you NEED 2016 Cyber Insurance Buying Guide. Financial Services Sector Coordinating Council for Critical infrastructure Protection and Homeland Security

Conclusion / Q&A