Best Practices for Insuring Medical Practices from Cyber Risk.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Department of Information Systems Brigham and Womens Hospital Laptop Encryption Catherine McGoldrick Schroeder Corp. Mgr, BWH IS Management & Planning.
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
Travelers CyberRisk for Insurance Companies
Pension Fund Trustees Liability Ncedi Mbongwe. Introduction to Camargue Underwriting Managers Established in 2001 Underwriters: Mutual and Federal and.
Presented at: Ctuit Software and Lathrop & Gage LLP Food & Hospitality Roundtable San Francisco, CA April 29, 2013 Presented by: Leib Dodell, Esq.
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
Presented by: Jamie Orye, JD, RPLU Beazley Group Pennsylvania Association of Mutual Insurance Companies Annual Spring Conference March 12, 2015.

BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Northern Insuring Agency 1. 2 Important Notice ●This presentation is not a representation that coverage does or does not exist for any particular claim.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Overview of Cybercrime
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Business Continuity from an Insurance Perspective Presented by Jim Carter Manager, Risk & Insurance.
AUGUST 25, 2015 Cyber Insurance:
Cyber Risk Insurance. Some Statistics Privacy Rights Clearinghouse o From 2005 – February 19, 2013 = 607,118,029 records reported breached. Ponemon Institute.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Managing your Institution-Specific HIPAA Compliance Policies and Procedures Cutting Edge Issues Thursday, December 13, 2007.
Matt Foushee University of Tulsa Tulsa, Oklahoma Cyber Insurance Matt Foushee University of Tulsa Tulsa, Oklahoma.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
1 CONFIDENTIAL ©2015 AIR WORLDWIDE New Approaches for Managing Cyber Risk.
New A.M. Best Cyber Questionnaire
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Cybersecurity Risk, Remediation, Response Nathan Gibson, CCE, CEH.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Restaurant 1. 2 There are several different types of restaurant classifications, including: Family Style Fine Dining Fast Food Buffet.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
Cyber Summit 2016 Data Bytes and Frights Presented by: President and CEO Peter J. Elliott, CPCU.
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
MEDICAL OFFICE COVERAGES. This is a short review over many insurance coverage parts necessary to a doctor’s practice. Not all apply, and there are other.
Retail & Service 1. 2 The Retail & Service industry encompasses a wide variety of businesses. This segment includes: Businesses engaged in selling goods.
Cyber Liability: New Exposures Presented by: Henriott Group © 2007, , Zywave Inc. All rights reserved.
Cyber Risk Management and Insurance
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Cyber Insurance - Risk Exposures and Strategic Solutions
Cyber Liability Insurance for an unsecure world
Cyber Insurance Risk Transfer Alternatives
New A.M. Best Cyber Questionnaire
Financial Institutions – Cyber Risk
Managing a Cyber Event Steven P. Gibson President
Cyber Insurance – FFs & CHBs
Cyber Insurance: An Update on the Market’s Hottest Product
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Cyber Exposures The Importance of Risk Identification and Transfer
Forensic and Investigative Accounting
Business Compromise and Cyber Threat
Cyber Security: What the Head & Board Need to Know
Presentation transcript:

Best Practices for Insuring Medical Practices from Cyber Risk

Karin Landry Spring Consulting Group, LLC Managing Partner

3 “There are two kinds of companies today, those who know they have been hacked, and those who don’t.” James Comey FBI Director (USA Today, May 2014)

4 Cyber Risk Trend/Statistics 2013 Verizon Data Breach Study Organized crime accounts for 55% of all breaches studied Organizations under 100 employees account for 31% of all breaches 66% of breaches took months to discover 69% of breaches are discovered by external party 78% of the breaches are considered low to very low difficulty Method of action: –40% Malware –52% Hacking Most desired data for organized crime: –Payment card information –Authentication credentials –Bank account information 48% of the 47,000 security incidents studied were attributed to errors such as: –Lost devices –Publishing errors –Mis-delivered /mail

5 True Cost of a Data Breach $188 Per Record for U.S.* Forensics (determining where, what and how much data was breached) Notification (as required by law) Fines/Penalties Loss of Customers/ Donors Damage Control Expenses (to retain clients, restore confidence in org. and restore reputation) NOTE: This study DOES NOT factor in costs associated with defense costs or liability payments made *Source: 2013 Cost of a Data Breach Study – Ponemon Institute

6 Anatomy of a Data Breach Incident Malicious attack, employee error, or theft Discovery Victims are sometimes the last to know. Usually discovered within months Forensics Analysis What, Where and How Response Compliance to regulatory requirements for notification Damage Control Offering credit monitoring /fraud monitoring to impacted parties

7 Common Cyber Risk Coverages Media/Website Publishing Liability Security Breach Liability Crime - Extortion and computer fraud/funds transfer fraud Restoration/ Replacement of Electronic Data Business Income/Extra Expense Security Breach Expense Public Relations Expense Fines/Penalties - Regulatory proceedings and payment card industry Employee Privacy Liability

8 Regulatory Considerations: Data Breach Notification Laws In effect in 47 states except: –Alabama –New Mexico –South Dakota Subject to statutory fines/penalties –Exemptions and notification deadlines vary by state HIPAA /HITECH law to entities that keep patient health information –Enforced by the Department of Health/Human Services

9 Social Media Exposures Content Potentially liable for content (i.e., Facebook page, YouTube video, blog on your website) Privacy Content posted can breach a person’s privacy or lead to identity theft Intellectual Property Infringement Copyright/trademark Virus/Malware Could be uploaded to your social media site that infects other members who click on that link Reputational/Public Relations Risk Certain negative content can go viral and reach a critical mass of people in a very short time

10 Risk Management View Cyber viewed as very high profile risk by CEOs, CFOs, treasurers and risk managers Captive may be an excellent alternative to fill gaps between self insurance and true risk transfer –Cyber risk may diversify a captive’s more traditional risk *Source: Business Insurance Survey 56% of risk managers cite cyber risk as “top concern”* 52% of risk managers have dedicated cyber risk insurance policy*

11 How to Price Cyber Insurance The market for network, information security, and privacy (cyber) insurance remained stable in 2013 Recent events will define the market for the next several years Pricing sources: –Commercial market quotes –Broker indications based on: Industry (retail, manufacturing, financial institution) Exposure (credit cards, healthcare personal data, SSNs, HIPAA exposures) Company size (# of customers, # of transactions) –Actuary –Transfer pricing study

Case Study: Nittany Insurance Company

13 Nittany Insurance Company Single-parent Vermont-based captive, owned by The Pennsylvania State University 1992 Established as funding vehicle for hospital professional liability insurance 2000 Expanded to include reinsurance of primary GL and auto coverage Later in 2000’s Added more coverages for convenience of University (i.e. deductible reimbursement for master insurance programs)

14 Penn State University Flagship land-grant University in the Commonwealth of Pennsylvania –However, NOT owned by the State Operating Budget 2013/14: $5 Billion 25,000 full-time faculty and staff, plus another 15,000 part-time employees 93,000 students at 20 campuses Two hotel/conference centers One very large football stadium

15 The Situation Decentralized educational departments and IT networks/ systems 22 million overtly-hostile computer intrusions blocked daily 170,000 accounts receive 3.2 million s daily Over 95 million spam s blocked daily Insurers not interested in covering large research institution with open computing philosophy Commercially available policy forms did not provide needed coverage Wanted a single funnel to accumulate expenses and manage responses to breaches Wanted behavior modification: –Incentivize decentralized units to use good computer security practices

16 The Solution Placed risk in owned captive Key feature of the coverage is a two-tiered deductible –If a unit employs certain “good practices” advocated by IT Security Operation Services, but has a breach anyway, $25,000 deductible –If a unit did not employ “good practices”, and that led or contributed to a breach, $100,000 deductible

17 The Results Firewalls more reliably installed, maintained and patched Security software updated real-time Software contracts routinely scrutinized and include security requirements Actual compromises decreased significantly Release of SSN’s declined from 10,000 at a time to 5-10 in isolated instance

18 Contact Information w w w. s p r i n g g r o u p. c o m Karin Landry Managing Partner Spring Consulting Group, LLC Phone: ; ext. 102