Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Beazley presentation master February 2008 Data Security & Beazley Breach Response Max Perkins October 4, 2013.
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Presented at: Ctuit Software and Lathrop & Gage LLP Food & Hospitality Roundtable San Francisco, CA April 29, 2013 Presented by: Leib Dodell, Esq.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
© 2014 Nelson Brown Hamilton & Krekstein LLC. All Rights Reserved PRIVACY & DATA SECURITY: A LEGAL FRAMEWORK MOLLY LANG, PARTNER, NELSON BROWN & CO.
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
Cyber Insurance Today: Lots of Interest, Lots of Product Innovation, and Lots of Risk Richard S. Betterley, CMC Betterley Risk Consultants, Inc. Sterling,
Responding to a Data Security Breach
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
INFORMATION SECURITY & PRIVACY OVERVIEW September 23, 2014.
Presented by: Jamie Orye, JD, RPLU Beazley Group Pennsylvania Association of Mutual Insurance Companies Annual Spring Conference March 12, 2015.
Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
NEFEC - Cyber Liability MICHAEL GUZMAN, ARM ARTHUR J. GALLAGHER & CO.
Overview of Cybercrime
Leadership, Knowledge, Solutions…Worldwide. Privacy & Data Security Understanding Identity theft The art of managing a crisis Jim Leonard – Marsh FINPRO.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Non Physical Business Interruption Malcolm Randles, Underwriter, Kiln Syndicate February 2011.
Business Continuity from an Insurance Perspective Presented by Jim Carter Manager, Risk & Insurance.
AUGUST 25, 2015 Cyber Insurance:
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Cyber Risk Insurance. Some Statistics Privacy Rights Clearinghouse o From 2005 – February 19, 2013 = 607,118,029 records reported breached. Ponemon Institute.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
0 Marsh Issues in Risk Management: Privacy and Data Breach Risk Review & Discussion John McLaughlin, Marsh USA.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Cyber-insurance coverage: do you have it? Robert E. Sumner, IV, Esq. and Tosh Siao of Willis Group September 17, 2015.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Carlsmith Ball LLP Cyber Issues For Lawyers Deborah Bjes October 22 nd, 2015.
1 CONFIDENTIAL ©2015 AIR WORLDWIDE New Approaches for Managing Cyber Risk.
Managing Your Cyber/E&O Risk with Willis FINEX Robert Barberi, Vice President, Willis Cyber Practice.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Law Firm LLP | Cyber Insurance | July 16th, 2014 Page 1 Cyber Exposure Landscape "The single biggest threat still is people inadvertently bringing down.
CYBER RISK INFORMATION CFO Division Office of Risk Services November, 2010.
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Cyber Insurance - Risk Exposures and Strategic Solutions
Cyber Liability Insurance for an unsecure world
Cyber Insurance Risk Transfer Alternatives
Breaking Down Cyber Liability
Financial Institutions – Cyber Risk
E&O Risk Management: Meeting the Challenge of Change
Managing a Cyber Event Steven P. Gibson President
September 18, 2018.
Cyber Insurance Overview
Cyber Insurance 101 South Texas Chapter Risk & Insurance Management Society May 17, 2017 Matt C. Green, Marsh.
Chapter 3: IRS and FTC Data Security Rules
Cyber Insurance: An Update on the Market’s Hottest Product
Society of Risk Management Consultants Annual Conference
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
By Joseph Carnevale, CIP Partner & Director of Sales
Cyber Liability Coverage – Sell it or get sued
Forensic and Investigative Accounting
Cyber Security: What the Head & Board Need to Know
Anatomy of a Common Cyber Attack
Presentation transcript:

Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013

MARSH 1 April 23, 2015 What are Network Security/Privacy Risks? Legal liability to others for computer security breaches Legal liability to others for privacy breaches of confidential information Costs to investigate and notify others of a breach Regulatory actions, fines and scrutiny Cyber-extortion Cyber-terrorism Electronic content Loss or damage to data / information Loss of revenue due to a computer attack Extra expense to recover / respond to a computer attack Loss or damage to reputation

MARSH 2 April 23, 2015 Threat and Regulatory Environment Internal –Rogue employees –Careless staff External –Business Associates/Vendors/ Suppliers –Organized crime Foreign Domestic –Hackers/Hacktivists Technology –Viruses, SQL Injections, etc… –Structural vulnerability –Social Media/Networking –Phishing Old school –Laptop theft –Dumpster diving Regulatory –HIPAA, HITECH, Red Flags –FTC, HHS, state attorney generals –47 State Breach notification laws –Foreign Laws: Canada, South Korea, Spain –DHS/NIST developing Cyber Framework –EU Parliament has introduced its General Data Protection Regulation

MARSH 3 April 23, 2015 What types of information is at Risk Many people think that without credit cards or PHI, they don’t have a data breach risk. But can you think of any business without any of the below kinds of information? Consumer Information Credit Cards, Debit Cards, and other payment information Social Security Numbers, ITIN’s, and other taxpayer records Customer Transaction Information, like order history, account numbers, etc. Protected Healthcare Information (PHI), including medical records, test results, appointment history Personally Identifiable Information (PII), like Drivers License and Passport details Financial information, like account balances, loan history, and credit reports Non-PII, like addresses, phone lists, and home address that may not be independently sensitive, but may be more sensitive with one or more of the above Employee Information Employers have at least some of the above information on all of their employees Business Partners Vendors and business partners may provide some of the above information, particularly for Sub-contractors and Independent Contractors All of the above types of information may also be received from commercial clients as a part of commercial transactions or services In addition, B2B exposures like projections, forecasts, M&A activity, attorney- client communication, litigation strategy and trade secrets

MARSH 4 April 23, 2015 Threat Environment- Targets of Opportunity Verizon Security Consultants 2013 Data Breach Investigations Report A sample of 47,000 reported incidents with 621 confirmed breaches. Some key findings: –78% were not highly difficult involving little to no resources or customization of software. –75% were not targeted at a specific individual or company –76% of network intrusions exploited weak or stolen credentials –29% of attacks utilized social tactics ( , phone calls, or social network information) –14% of attacks involved insiders; 50% of those were former employees using old credentials –2/3 rds of breaches involved data at rest (databases and file servers). The remaining amount was compromised at the time processed. –66% of breaches took months (62%) or years (4%) to discover –69% of breaches were discovered by an external party (9% by customers) Industries groups represented by percent of breaches (total exceeds 100% due to rounding): –37% from Finance and Insurance –24% from Retailers –20% from Manufacturers, transportation and utility –20% Information and professional service firms

MARSH 5 April 23, 2015 Simplified Data Breach Timeline Discovery First Response External Issues Long-Term Consequence s Actual or alleged theft, loss, or unauthorized collection/disclosure of confidential information that is in the care, custody or control of the Insured, or a 3 rd for whom the Insured is legally liable. Discovery can come about several ways: Self discovery: usually the best case Customer inquiry or vendor discovery Call from regulator or law enforcement Actual or alleged theft, loss, or unauthorized collection/disclosure of confidential information that is in the care, custody or control of the Insured, or a 3 rd for whom the Insured is legally liable. Discovery can come about several ways: Self discovery: usually the best case Customer inquiry or vendor discovery Call from regulator or law enforcement Forensic Investigation and Legal Review Forensic tells you what happened Legal sets out options/obligations Forensic Investigation and Legal Review Forensic tells you what happened Legal sets out options/obligations Remedial Service Offering Public Relations Civil Litigation Regulatory Fines, Penalties, and Consumer Redress Damage to Brand or Reputation Income Loss Notification

MARSH 6 April 23, 2015 What would a Breach Cost? Regulatory Actions usually precedes the civil action, substantial expense-legal and forensic can be incurred even for events where no one is actually harmed or even at risk of harm Number of Records Compromised100,000500,0001,000,000 Number of Credit Card Numbers Compromised100,000500,0001,000,000 Forensics, Legal & Advisory Costs$100,000 $250,000 Notification Costs$200,000$1,000,000 Call Center Costs$100,000$500,000$1,000,000 Credit Monitoring Costs$300,000$1,500,000$2,250,000 Identity Theft Repair Costs$500,000$2,500,000$5,000,000 Estimated First Party Costs$1,200,000$5,600,000$9,500,000 Credit Card Reissuance Costs$600,000$3,000,000$6,000,000 Consumer Redress Fund & Fines$600,000$3,000,000$6,000,000 Other Liability$500,000$2,500,000$5,000,000 Defense Costs$100,000$500,000$1,000,000 Estimated Third Party Liability (Inc. defense)$1,800,000$9,000,000$18,000,000 Estimated Privacy Event Insurable Cost$3,000,000$14,600,000$27,500,000 Assumptions Per record notification cost$2.00 $1.00 Call center participation rate20% Per call cost$5.00 Credit monitoring participation rate15% Credit monitoring per record cost$20.00 $15.00 Identity theft rate of occurrence5% Identity theft per record cost$ Credit card reissuance cost per card$6.00 Consumer Redress & Fines per record$6.00 Other liability experience rate1% Other liability cost per record$500.00

MARSH 7 April 23, 2015 Network Security/Cyber Coverage Overview Privacy Liability:Harm suffered by others due to the collection or disclosure of confidential information. Network Security Liability: Harm suffered by others from a failure of your network security Cyber-Extortion: The cost of investigation and the extortion demand (limited cover for ransom & crisis consultant expenses) Regulatory Defense:Legal counsel for regulatory actions including coverage for fines and penalties where permissible Event/Breach Costs: The costs of complying with the various breach notification laws and regulations including legal expense, call centers, credit monitoring and forensic investigation. Data Property:The value of data stolen, destroyed, or corrupted by a computer attack Business Interruption: Business income that is interrupted by a computer attack or a failure of technology including the extra expense. Coverage for Privacy Liability requires no negligence on the part of the insured and provides coverage for the intentional acts of insured’s employees

MARSH 8 April 23, 2015 Information Risk Insurance Marketplace Robust market with $350MM of market capacity for liability (third party) $200MM for Business Interruption (first party) –Appetite varies by coverage triggers and industry –Concern about risk aggregation associated with cloud computing –Limited appetite for full Contingent Business Interruption Increase in loss activity Recent Innovations –Turnkey breach management approach –Pre-loss control services

MARSH 9 April 23, 2015 Carrier approach Currently there are two approaches in the market: –Providing a dollar sublimit Pros: ­Insured maintains control of the process ­Insured knows exactly how much money they have available for an “event” ­Can be outside the limit of liability Cons: ­Insurer may not agree to all costs incurred ­Insurer may not approve insured’s selected vendors ­Dollar sublimit may not be sufficient to respond to all costs associated with an “event” –Providing a per person sublimit. Pros: ­Typically outside the aggregate limit of liability ­Insured selects response firm from a panel counsel list ­the response is handled by the insurer Cons: ­The Insured hands over the response to the insurer’s vendors -Larger clients, the per person sublimit removes control which they expect to maintain ­Typically only offered to companies with <$4B in revenue

MARSH 10 April 23, 2015 Marsh This document and any recommendations, analysis, or advice provided by Marsh (collectively, the “Marsh Analysis”) are intended solely for the entity identified as the recipient herein (“you”). This document contains proprietary, confidential information of Marsh and may not be shared with any third party, including other insurance producers, without Marsh’s prior written consent. Any statements concerning actuarial, tax, accounting, or legal matters are based solely on our experience as insurance brokers and risk consultants and are not to be relied upon as actuarial, accounting, tax, or legal advice, for which you should consult your own professional advisors. Any modeling, analytics, or projections are subject to inherent uncertainty, and the Marsh Analysis could be materially affected if any underlying assumptions, conditions, information, or factors are inaccurate or incomplete or should change. The information contained herein is based on sources we believe reliable, but we make no representation or warranty as to its accuracy. Except as may be set forth in an agreement between you and Marsh, Marsh shall have no obligation to update the Marsh Analysis and shall have no liability to you or any other party with regard to the Marsh Analysis or to any services provided by a third party to you or Marsh. Marsh makes no representation or warranty concerning the application of policy wordings or the financial condition or solvency of insurers or reinsurers. Marsh makes no assurances regarding the availability, cost, or terms of insurance coverage.