John A. Wright, CEO WIPFLI Client Appreciation June 8, 2017

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Travelers CyberRisk for Insurance Companies
Presented at: Ctuit Software and Lathrop & Gage LLP Food & Hospitality Roundtable San Francisco, CA April 29, 2013 Presented by: Leib Dodell, Esq.
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.

BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Draft of June 9, 2015 Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing.
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
Northern Insuring Agency 1. 2 Important Notice ●This presentation is not a representation that coverage does or does not exist for any particular claim.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
General Awareness Training
Overview of Cybercrime
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
AUGUST 25, 2015 Cyber Insurance:
Robert W. Carruth, CSP, ARM-P Risk Control Manager NCACC Risk Management Services.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Cyber Risk Insurance. Some Statistics Privacy Rights Clearinghouse o From 2005 – February 19, 2013 = 607,118,029 records reported breached. Ponemon Institute.
CYBER INSURANCE Luxury or necessary protection?. What is a data breach? A breach is defined as an event in which an individual’s name plus personal information.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Cyber-insurance coverage: do you have it? Robert E. Sumner, IV, Esq. and Tosh Siao of Willis Group September 17, 2015.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Cyber Summit 2016 Data Bytes and Frights Presented by: President and CEO Peter J. Elliott, CPCU.
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
MEDICAL OFFICE COVERAGES. This is a short review over many insurance coverage parts necessary to a doctor’s practice. Not all apply, and there are other.
Cyber Liability: New Exposures Presented by: Henriott Group © 2007, , Zywave Inc. All rights reserved.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Cyber Insurance - Risk Exposures and Strategic Solutions
Cyber Liability Insurance for an unsecure world
Data/Cyber Security: an Essential Part of Risk Management
Cyber Insurance Risk Transfer Alternatives
Law Firm Data Security: What In-house Counsel Need to Know
Data/Cyber Security: an Essential Part of Risk Management
Breaking Down Cyber Liability
New A.M. Best Cyber Questionnaire
Financial Institutions – Cyber Risk
E&O Risk Management: Meeting the Challenge of Change
Managing a Cyber Event Steven P. Gibson President
Regulatory Compliance
Introduction to the Federal Defense Acquisition Regulation
Cyber Insurance Overview
Chapter 3: IRS and FTC Data Security Rules
I have many checklists: how do I get started with cyber security?
Society of Risk Management Consultants Annual Conference
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Cyber Exposures The Importance of Risk Identification and Transfer
By Joseph Carnevale, CIP Partner & Director of Sales
Cybersecurity compliance for attorneys
Cyber Risk & Cyber Insurance - Overview
Ransomware and Data breaches in public libraries
Cyber Liability Coverage – Sell it or get sued
Forensic and Investigative Accounting
Cyber Security: What the Head & Board Need to Know
Anatomy of a Common Cyber Attack
Presentation transcript:

John A. Wright, CEO WIPFLI Client Appreciation June 8, 2017 Cyber Risk Management and Risk Transfer Issues Issues and Challenges for Companies managing Cyber Exposures John A. Wright, CEO WIPFLI Client Appreciation June 8, 2017

Discussion Outline Understanding the scope of the problem What are the first steps? Understanding and evaluating your exposures Establish a Crisis plan Planning for Risk Mitigation Cyber Insurance Areas of insurance to be aware of and explore Prevention strategies

Uncomfortable Truths of Cyber Risk* Technology Solutions alone can never keep pace with dynamic cyber threats Defense is harder to play than Offense They only have to win once to cause damage True for all threat management Attackers have patience and latency on their side Source: Harvard Business Review May 16, 2017, “The Best Cybersecurity Investment You Can Make Is Better Training” by Dante Disparte and Chris Furlow

Prophetic Words

Data Records Lost or Stolen Statistics* Daily – 4,428,790 records breached 4% of Breaches were “Secure Breaches” Encryption was used Stolen Data rendered useless Symantec Threat Report – 2016 Breaches of Firms by Employees Size 43% of breaches: 1-250 employees 22% of breaches: 251-2500 employees 35% of breaches 2500+ employees

Evaluation of Exposures What types of information do you maintain internally/externally What contractual commitments has your company committed to on behalf of others Open end assumption of IP in the event of cyber breaches that your company, employees, independent contractors, subs. are responsible for Limitation of Damages Duty to notify their constituents What contracts do you have with “data storage providers” such as cloud services What protections do they provide via indemnity, hold harmless agreements, insurance protection, etc. Are there limitations of damages in their contracts

Methods for determining Financial Exposures to Loss Number of Records requiring statutory notification Not just customers but unique data records Contractual Obligations Number of Employee records Archived Data Information Credit Card transactions Calculators online Basic guidelines: Small to Mid-size companies - $65 per record to calculate transferable risk exposure Average Cyber Breach Loss - $2,100,000

Types of Information held Counts Assume 10,000 records breached Net Diligence Mini Data Breach Cost Calculator No Class Action Lawsuits assumed PCI records: $380,750 $38 cost per record PII and PHI records: $ 2,257,250 $226 cost per record Differential is mostly Regulatory Fines and Penalties

Plan Ahead Before a Breach Happens – Just scratching the surface Identify your Exposures and Quantify Establish Policies and Procedures for Data Security Establish a Crisis Response protocol and team- Who is in charge? Train All Employees on basics Password protocols Financial transfer procedures Understanding consequences of opening attachments Dual authentication of information Understanding what is a reportable Breach and what to do in the event it occurs BYOD policies and safeguards File Discipline and Storage

Cyber Risk Insurance Very little coverage for Data Breach events in your insurance programs without Cyber Risk Coverage. There is no intent to cover this under standard policies of General Liability, Commercial Crime, and D&O coverage Approximately 80 different underwriters offer various types of cyber insurance No policy form is the same! Rapidly evolving terms and conditions

Cyber Liability Defined Insurance coverage specifically designed to protect a business or organization from: Liability claims involving the unauthorized release of information for which the organization has a legal obligation to keep private or confidential Liability claims alleging invasion of privacy and/or copyright/trademark violations in a digital, online or social media environment Liability claims alleging failures of computer security that result in deletion/alteration of data, transmission of malicious code, denial of service, etc. Defense costs in State or Federal regulatory proceedings that involve violations of privacy law The provision of expert resources and monetary reimbursement to the Insured for the out-of-pocket (1st Party) expenses associated with the appropriate handling of the types of incidents listed above

Coverage Components Privacy Liability Coverage Privacy Regulatory Claims Coverage Security Breach Response Coverage Security Liability Multimedia Liability Cyber Extortion Business income and Digital Asset Restoration PCI-DSS Assessments Cyber Deception coverage

Some Issues to be aware of! What is the definition of Cyber Breach? Hacking event? Data that is sent mistakenly to an unauthorized party? Dumpster Diving? Are there policy warranties – Conditions that void coverage if not in place Encryption Prohibited use of memory sticks Personal devices

Some Issues to be aware of! Who are the Crisis Response teams for Breach response and Forensics What services do they provide pre-breach? Can you choose your own? Can you access them 24 hours? What are your deductibles? Per breach event? Deductible per coverage section Is there a percentage deductible?

Some Issues to be aware of! Are coverage limits aggregated or separate? Is there a # of records limit versus monetary value? Is there coverage for Contractually assumed exposures? What are the claims triggers by coverage? Claims made and reported? Claims made? Extended reporting periods? What is the duty to notify? What type of notification is covered? Statuatory or Voluntary

Prevention Strategies Patch applications and operating systems “Whitelist” applications Restrict administrative privileges Segment and separate networks – restrict host to host communications paths Validate inputs Tune file reputation systems Maintain firewalls Source: Joint analysis report 16-20296, Dept. of Homeland Security and the FBI

Conclusion The game has changed regarding protection of confidential data held by you Statutory oversights have increased Enterprise risk management by cloud service providers and payment processors have limited the potential to recover from them or be protected by them Internal policies, focus and external risk transfer can provide a safety net to protect your balance sheet if prepared If not, watch out!!