Managing Your Cyber/E&O Risk with Willis FINEX Robert Barberi, Vice President, Willis Cyber Practice.

Slides:



Advertisements
Similar presentations
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Advertisements

CYBER & Product Liability & Professional Indemnity
Presented at: Ctuit Software and Lathrop & Gage LLP Food & Hospitality Roundtable San Francisco, CA April 29, 2013 Presented by: Leib Dodell, Esq.
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
Cyber Insurance Today: Lots of Interest, Lots of Product Innovation, and Lots of Risk Richard S. Betterley, CMC Betterley Risk Consultants, Inc. Sterling,
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
INFORMATION SECURITY & PRIVACY OVERVIEW September 23, 2014.
Presented by: Jamie Orye, JD, RPLU Beazley Group Pennsylvania Association of Mutual Insurance Companies Annual Spring Conference March 12, 2015.
Recent Trends and Insurance Considerations March 2015

Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
Draft of June 9, 2015 Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing.
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
In the Belly of the Breach: What Every In-House Counsel Needs to Know about Data Breach Response ACC International Legal Affairs Committee Legal Quick.
NEFEC - Cyber Liability MICHAEL GUZMAN, ARM ARTHUR J. GALLAGHER & CO.
Overview of Cybercrime
Leadership, Knowledge, Solutions…Worldwide. Privacy & Data Security Understanding Identity theft The art of managing a crisis Jim Leonard – Marsh FINPRO.
©2015, Amy Stewart PC Title Here Cyber Insurance: The Future is Now Texas Lawyer In-House Counsel Summit May 8, 2015 Texas Lawyer In-House Counsel Summit.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Non Physical Business Interruption Malcolm Randles, Underwriter, Kiln Syndicate February 2011.
2 September 2015 Building Scalable Insurance Programs For Each Growth Stage of a Entrepreneurial Company.
AUGUST 25, 2015 Cyber Insurance:
Cyber Risk Insurance. Some Statistics Privacy Rights Clearinghouse o From 2005 – February 19, 2013 = 607,118,029 records reported breached. Ponemon Institute.
. E-Business Risk and Insurance.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Cyber-insurance coverage: do you have it? Robert E. Sumner, IV, Esq. and Tosh Siao of Willis Group September 17, 2015.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Protecting your Managed Services Practice: Are you at Risk?
PARTNERING TO CREATE THE SAFEST HEALTHCARE SYSTEM Insurance Operations Update HIROC Risk Management Conference April 28, 2014 Heather Brown, Vice President.
Cyber Summit 2016 Data Bytes and Frights Presented by: President and CEO Peter J. Elliott, CPCU.
Hot Topics in Technology Transactions Presented by: Robert J. Scott
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Cyber: risk without borders Airmic 2016 Harrogate International Centre Tuesday 7 th June 2016.
Retail & Service 1. 2 The Retail & Service industry encompasses a wide variety of businesses. This segment includes: Businesses engaged in selling goods.
Cyber Liability: New Exposures Presented by: Henriott Group © 2007, , Zywave Inc. All rights reserved.
CGL Coverage B and Specific Products Covering Data Breaches Primerus Convocation Amelia Island, FL April 2015.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Cyber Insurance - Risk Exposures and Strategic Solutions
Cyber Liability Insurance for an unsecure world
Cyber Insurance Risk Transfer Alternatives
Breaking Down Cyber Liability
Financial Institutions – Cyber Risk
Financial Technology in Cyber Risks
Cyber Insurance presentation for: The 2nd Anti Cybercrime Forum Beirut, 29th November 2016 Alexander Blom, Head of Financial Lines, AIG MENA.
E&O Risk Management: Meeting the Challenge of Change
Managing a Cyber Event Steven P. Gibson President
6 October 2016 Social media: do you have the right social media strategy that will impact your business’ growth? - Legal and Regulatory Issues William.
Can Cyber Insurance Stand in the Data Breach
Cyber Insurance Overview
Cyber Insurance 101 South Texas Chapter Risk & Insurance Management Society May 17, 2017 Matt C. Green, Marsh.
Chapter 3: IRS and FTC Data Security Rules
Cyber Insurance: An Update on the Market’s Hottest Product
Society of Risk Management Consultants Annual Conference
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Cyber Exposures The Importance of Risk Identification and Transfer
By Joseph Carnevale, CIP Partner & Director of Sales
Cyber Liability Coverage – Sell it or get sued
Forensic and Investigative Accounting
Cyber Security: What the Head & Board Need to Know
Presentation transcript:

Managing Your Cyber/E&O Risk with Willis FINEX Robert Barberi, Vice President, Willis Cyber Practice

2 Quantifying The Loss: Analytics TOTAL COST = (# PEOPLE) X $363 OLD  NEW  ANALYTICS & LOSS MODELING

3 Quantifying The Loss: Estimated Breach Costs

4

5 Program Considerations A range of limit, retention and privacy breach response cost sub-limit options are available All options have certain trade offs, which must be identified and weighed Third Party only First and Third Party Costs coverage options  Full limits  Per Person Coverage  Notification coverage inside or outside the Policy Aggregate Limit  Quota Share When considering the types of coverage that is appropriate, the organization should consider the following: Internet & Network Business Interruption. What is the impact of an interruption on the organizations network or web-site service? What percentage of sales/customer offerings are being offered online or are network dependent? Loss of Data through an IT security Event or Theft. What is the value of your data or programs? What would the expense of recovering your data cost your operations? What customer lists, customer preference information, supplier information, pricing information and other vital competitive information may be at risk for theft by a thief or hacker? Liability for loss or disclosure of confidential information. What confidential information does the organization hold and what is the potential loss if a class action were to be commenced? What would be the cost of notifying and providing credit monitoring for those customers? What are the costs of defending an investigation by regulators and how much might fines be if they are imposed? Liability of loss as a result of the acts of a third-party. What activities are third party vendors doing on your behalf? What important commercial or confidential data do they hold and what would be the loss or liability if it were to be corrupted or released? Media Exposure. What is your exposure to potential trademark infringement from domain name, slogan or advertising message, product names, etc.; copyright violations for content on websites, brochures or elsewhere; accusations of false advertising and unfair competition; infringement of trade secrets

6 Program Considerations Coverage Enhancements: Privacy Expense:  Outside of liability limits options  New express coverage (e.g., ID Theft Restoration Response)  Large (Full+) Limits  Coverage for breaches in the cloud Regulatory and/or PCI Fines/Penalties – larger limits available Excess “Drop Down” Limits  Excess carriers can drop down over all underlying sublimits 1st Party Coverage  Administrative Error Triggers  Lower BI Waiting Periods  Cloud Failure Coverage Examples of Coverage Issues: Breaches or Disruptions in the Cloud Acts of Rogue Employees Encryption Exclusions Credit Monitoring Coverage Terrorism Limited 1 st Party Coverage

7 Contact Information ROBERT O. BARBERI, JR., Vice President WILLIS COLIN ZICK Partner and Chair, Privacy & Data Security Practice FOLEY HOAG LLP FRED HOWELL, MBA, MSISM, CISSP Manager of Security and Privacy Consulting Services RSM LLP STEVE SCHOENBERGER Vice President WILLIS