SlideShare una empresa de Scribd logo
1 de 35
Discussing Cyber Risk Coverage 
With Your Commercial Clients 
Steve Robinson 
Area President 
RPS Technology & Cyber 
October 17, 2014
Threat Landscape 
and Common 
Misperceptions
Facts 
 When it comes to data breach, size 
doesn’t matter* 
 It’s more than just hacking 
 The “we’ve got this covered” attitude is 
waning 
 IT is now very much on board 
*Source: 2013 Data Breach Investigations Report 
Verizon RISK Team, et al
The Changing Threat Landscape 
“Our 2013 findings suggest that there’s a lot of 
complacency among organizations about the 
risk of espionage attacks. The assumption is 
that these attacks only target government, 
military and high-profile organizations, but our 
data shows that this increasingly isn’t true. 
Don’t underestimate the likelihood that your 
organization will be a target..” 
Source: 2013 Data Breach Investigations Report 
Verizon RISK Team, et al 
RPS Technology & Cyber
Information Risks – 
What Can Go Wrong?
Information Risks 
Hazards 
 Hacker Attacks/Unauthorized Access 
 Virus/Malicious Code 
 Denial of Services Attacks 
 Malicious Hardware 
 Physical Theft of Device/Media 
 Accidental Release 
 Employee/Vendor Error 
 Rogue Employees 
 Social Engineering
Information Risks 
Source: Open Security Foundation
Industry-Specific 
Threats
Industry-Specific Threats 
Healthcare Retail Education Hospitality Financial Public Entity Nonprofit Mfg Technology 
RPS Technology & Cyber 
Breach of Personally 
Identifiable Info (PII) 
Breach of credit card 
data & PCI Fines 
Breach of Protected 
Health Information 
(PHI) 
Breach of customers’ 
rights to privacy 
Breach of 
confidential 
employee data 
eBusiness 
Interruption 
Technology Errors or 
Omissions 
Personal Injury – 
Social Media 
Environment 
Intellectual Property 
Infringement 
Regulatory Liability 
Electronic Theft 
Cyber Extortion
Cost of a Data Breach
Data Breach Related Costs 
 Average cost per compromised record = $201.00* 
 Direct 
 Coordination 
 Defense 
 Notification expenses 
 Credit monitoring 
 Regulatory fines 
 Indirect 
 Customer churn 
 Impact on shareholder value 
 Loss of future opportunity 
Source: Ponemon Institute 2013 Annual Study “Cost of a Data Breach”
Related Costs 
Per Capita Cost By Industry Classification* 
Source: Ponemon Institute 2013 Annual Study “Cost of a Data Breach”
Mitigating Risk in our 
Clients’ Businesses
How Can Clients Reduce Their Risk? 
 Data Management* 
 Collection 
 What employee, customer, donor/volunteer (nonprofits) data are you storing? 
 Do you need to store it? 
 Access 
 Who in your organization has access to sensitive information? 
 Do those with access absolutely need access to perform their job? 
 What of this information is publically available? 
 Use 
 Are you using customer info in a manner it was originally intended (and consistent with the 
way you communicated to your customers?) 
 Storage 
 Where is your data stored? 
 Is the stored information protected by access controls? 
 Does sensitive customer information exist in multiple formats? 
 Eradication 
 How long do you keep customer information? 
 What do you do with info (in any format) you no longer need? 
 3rd party vendor agreements for document storage, 
disposal, janitorial services, etc. 
Source: NTEN – Nonprofit Technology Network
How Can Clients Reduce Their Risk? 
 Policies & Procedures 
 Privacy 
 Do you have a written privacy policy in place? 
 Have employees and/or volunteers been trained? 
 Social Media 
 Inventory your social media presence - regularly 
 Restrict authority for creation and content management on behalf of your organization to 
one or two designated employees 
 Are there restrictions for social media access on systems that connect to your network 
containing personal information on customers, employees, etc.? 
 Websites, Intellectual Property & Electronic Communication 
 Consistency of content and message? 
 Legal review? 
 Have appropriate rights been secured (music, lyrics, video, etc.) 
 Staff training in email etiquette 
 Network Security 
 Software, patch management, spam filters, firewall protection, etc. & Credentialing 
 Encryption of data - at rest and in a mobile state 
 Vulnerability testing 
 BYOD policies
How Can Clients Reduce Their Risk? 
 Risk Transfer 
 Vendor Agreements 
 Appropriate transfer of liability language in vendor contracts? 
 Cloud providers 
 Payment processors 
 Website hosting services 
 Document disposal, storage and janitorial services 
 Insurance 
 Cyber/Privacy Liability Insurance
Cyber Risk 
Insurance Coverage
What is Cyber Risk Insurance? 
 Insurance coverage designed to protect a business from: 
 Liability associated with: 
• Unauthorized release of confidential information 
• Violation of a person’s rights to privacy 
• Personal injury in an electronic/social media environment 
• Intellectual property infringement 
• Violations of state or federal privacy laws 
 Out-of-pocket expenses incurred to make the above problems go away
Cyber Risk Insurance 
RPS Technology & Cyber 
Exposure Category Description 
Privacy Liability Provides liability coverage for failure to protect electronic or non-electronic information in your 
care custody and control. Can include coverage for acts of vendors as well. 
Network Security Liability Provides liability coverage if an Insured's Computer System fails to prevent a Security 
Breach, becomes inaccessible to those who need it or unintentionally transmits a virus to a 
3rd party. 
Media Content Liability Provides liability coverage for Intellectual Property and Personal Injury lawsuits stemming 
from your website or social media content under your direct control. 
Regulatory Liability Defense coverage for legal proceedings or investigations by Federal, State, or Foreign 
regulators relating to Privacy Laws. 
Crisis Management 
Legal Assistance Expense Expenses incurred to hire an attorney to help navigate the breach response process in accordance 
with the multitude of State and federal laws. 
Forensic Expense Expenses incurred to hire a firm to conduct IT forensics investigations following a data breach. 
Notification Expense Expenses incurred to notify members of a breach in accordance with State and Federal laws. 
Credit Monitoring Expense Expenses incurred to provide donors with access to identity protection services. 
Public Relations Expense Expenses incurred to hire a public relations consultancy, media expenses, etc. in the wake of a data 
breach. 
Data Recovery/Restoration Expenses incurred to re-create data that is damaged as a result of a cyber incident. 
Business Interruption The reduction of business income as a result of an interruption or use of a computer system as a 
result of a network breach to their system. 
Cyber Extortion Expenses incurred resulting from threats to introduce a system hack, virus, etc. or from threats to 
disseminate or use information contained in your computer systems to destroy or alter your 
computer systems. 
Fines and Penalties Where permissible by law, expenses incurred as a result of a State, Federal or other (PCI DSS) fine or 
penalty resulting from a data breach.
Doesn’t My Insurance 
Already Cover This?
ISO General Liability Form 
Coverage exclusion for claims of copyright, 
trademark infringement.
ISO Property Form 
Protects physical computers 
but not the data that is stored on them.
CGL Data Breach Exclusions 
Current ISO CGL form 
coverage is provided: 
“For personal and advertising 
injury as the offense of an oral or 
written publication in any manner, 
or material that violates a person’s 
right of privacy.” 
New ISO GL Exclusion (effective 
May 2014): 
“Exclusion – Access or Disclosure of 
confidential or personal information 
and data-related liability – with limited 
bodily injury exception.”
Doesn’t My Insurance Cover This? 
General Liability Property Crime Professional K&R Cyber 
3rd Party Privacy/Network 
Security/Personal Injury/IP 
Theft/Unauthorized Disclosure PII 
Breach of Confidential Corporate Info 
Technology E&O 
Media Liability/Social Networking 
Regulatory Defense/Penalties 
Virus/Malicious Code Transmission 
1st Party Privacy / Network Risks 
Legal Assistance/Breach Coach 
IT Forensics 
Physical Damage to Data 
Denial of Service Attack 
Business Income from Security Event 
Extortion or Threat 
Rogue Employee - Data Related 
Public Relations/Crisis Management 
Coverage Provided? 
Coverage Possible? 
No Coverage? 
* For reference and discussion only; policy language and facts of claim will require further analysis. This is not a 
guarantee of coverage.
Cyber Risk Coverage: 
Key Differentiators 
RPS Technology & Cyber
Cyber Risk Coverage 
 Samples of Key Differentiators: 
 Look carefully at the definitions 
 Unauthorized acts of employees 
 Coverage for electronic and non-electronic information 
 Vicarious liability - 3rd parties/vendors/cloud providers 
 Defense of privacy regulatory actions (at full privacy limits) 
 Regulatory fines & penalties 
 Sublimits for 1st party vs full limits 
 Breadth of media coverage
Cyber Risk Coverage 
 Common Exclusions 
 Intentional Acts – look closely here 
 Infrastructure failure 
 Software Responsibility/Inadequate Software 
 Unencrypted portable media 
 Wrongful Collection 
 Employment Practices
Not All Policies Are Created Equal
Cyber Endorsement “Fail”
Application Process & 
Rating Factors
Application Process & Rating Factors 
 Pricing 
 Class of business 
• High/Medium/Low 
• Number of patients and records held – medical 
 Annual revenue 
 Number of employees 
 Network defense parameters in place and update procedures 
 Information security policies 
 Loss history 
 Application 
 New streamlined options available
Coverage Trends
Coverage Trends 
 The tale of two worlds 
 Large retail – appetite, capacity, underwriting 
 Small business 
 Business Interruption triggers 
 Aggregation 
 Reputational Harm 
 Electronic Theft – monetary & otherwise 
 Retro date
Summary 
 Why Your Client Needs Cyber Risk Coverage 
 Specific exclusions exist in traditional policies for: 
• Privacy breach 
• Network related incidents 
• eBusiness Interruption 
• Personal Injury in Social Media, websites, blogs, etc. 
• Regulatory defense, fines 
 Buying coverage aligns pre and post-breach resources not 
afforded under other policies 
 Claims are on the rise 
 Laws are driving demand: 
• GLB, HIPAA, HI-TECH Act, FTC’s Red Flag Rule, etc. 
• 47 of 50 States require notification 
 Coverage is more accessible and affordable than ever
Thank You 
Steven R. Robinson 
Area President 
Steven_Robinson@RPSins.com 
www.RPSins.com 
410-901-0704 direct 
800-336-5659 toll free

Más contenido relacionado

La actualidad más candente

4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
SafeNet
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
travismd
 

La actualidad más candente (20)

Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and Preparation
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data Security
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspace
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Law
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 
Cyber liaility insurance the basics
Cyber liaility insurance   the basicsCyber liaility insurance   the basics
Cyber liaility insurance the basics
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
 
Data breach-response-planning-laying-the-right-foundation
Data breach-response-planning-laying-the-right-foundationData breach-response-planning-laying-the-right-foundation
Data breach-response-planning-laying-the-right-foundation
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
 
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)
 

Destacado

Commercial Risk Europe p1 & p16
Commercial Risk Europe p1 & p16Commercial Risk Europe p1 & p16
Commercial Risk Europe p1 & p16
David Benning
 

Destacado (14)

Commercial Risk Europe p1 & p16
Commercial Risk Europe p1 & p16Commercial Risk Europe p1 & p16
Commercial Risk Europe p1 & p16
 
Measuring usability
Measuring usabilityMeasuring usability
Measuring usability
 
Credit Risk In Commercial Real Estate Structured Financing
Credit Risk In Commercial Real Estate Structured FinancingCredit Risk In Commercial Real Estate Structured Financing
Credit Risk In Commercial Real Estate Structured Financing
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Abna Cash Flow, Credit Risk & Commercial Collections
Abna Cash Flow, Credit Risk & Commercial CollectionsAbna Cash Flow, Credit Risk & Commercial Collections
Abna Cash Flow, Credit Risk & Commercial Collections
 
Financial Instruments for Energy Markets
Financial Instruments for Energy MarketsFinancial Instruments for Energy Markets
Financial Instruments for Energy Markets
 
Split range control system
Split range  control systemSplit range  control system
Split range control system
 
Capgemini Commercial Insurance Risk Analytics Powered by HP HAVEn
Capgemini Commercial Insurance Risk Analytics Powered by HP HAVEnCapgemini Commercial Insurance Risk Analytics Powered by HP HAVEn
Capgemini Commercial Insurance Risk Analytics Powered by HP HAVEn
 
Business Development & Commercialization Plan
Business Development & Commercialization PlanBusiness Development & Commercialization Plan
Business Development & Commercialization Plan
 
Introduction to Internet of things
Introduction to Internet of thingsIntroduction to Internet of things
Introduction to Internet of things
 
CHC Safety & Quality Summit 2016 - Risk Culture in Commercial Air Transport
CHC Safety & Quality Summit 2016 - Risk Culture in Commercial Air TransportCHC Safety & Quality Summit 2016 - Risk Culture in Commercial Air Transport
CHC Safety & Quality Summit 2016 - Risk Culture in Commercial Air Transport
 
Internet of Things- An Introduction
Internet of Things- An IntroductionInternet of Things- An Introduction
Internet of Things- An Introduction
 
What Exactly Is The "Internet of Things"?
What Exactly Is The "Internet of Things"?What Exactly Is The "Internet of Things"?
What Exactly Is The "Internet of Things"?
 
5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things) 5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things)
 

Similar a Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson, RPS Technology & Cyber

The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
stevemeltzer
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
Mark Bennett
 
The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1
stevemeltzer
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
sraina2
 

Similar a Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson, RPS Technology & Cyber (20)

Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Cyber security
Cyber securityCyber security
Cyber security
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Legal challenges for big data companies
Legal challenges for big data companiesLegal challenges for big data companies
Legal challenges for big data companies
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 

Más de Don Grauel

Hal White 2010 Fowler Seminar
Hal White 2010 Fowler SeminarHal White 2010 Fowler Seminar
Hal White 2010 Fowler Seminar
Don Grauel
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
Don Grauel
 
Dan Hausmann 2010 Fowler Seminar
Dan Hausmann 2010 Fowler SeminarDan Hausmann 2010 Fowler Seminar
Dan Hausmann 2010 Fowler Seminar
Don Grauel
 
Sabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler SeminarSabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler Seminar
Don Grauel
 
Ron Adams 2010 Fowler Seminar
Ron Adams 2010 Fowler SeminarRon Adams 2010 Fowler Seminar
Ron Adams 2010 Fowler Seminar
Don Grauel
 

Más de Don Grauel (15)

Surety Industry Overview: State of the Industry by Cissie Scoggin
Surety Industry Overview: State of the Industry by Cissie ScogginSurety Industry Overview: State of the Industry by Cissie Scoggin
Surety Industry Overview: State of the Industry by Cissie Scoggin
 
Unti-Claims Handling Following Catastrophes 2013-10
Unti-Claims Handling Following Catastrophes 2013-10Unti-Claims Handling Following Catastrophes 2013-10
Unti-Claims Handling Following Catastrophes 2013-10
 
Ryan-Special Events Insurance Considerations 2013-10
Ryan-Special Events Insurance Considerations 2013-10Ryan-Special Events Insurance Considerations 2013-10
Ryan-Special Events Insurance Considerations 2013-10
 
Petit-Workers Compensation—Medicare Secondary Payer Issues 2013-10
Petit-Workers Compensation—Medicare Secondary Payer Issues 2013-10Petit-Workers Compensation—Medicare Secondary Payer Issues 2013-10
Petit-Workers Compensation—Medicare Secondary Payer Issues 2013-10
 
Donald-Climate Change, Uncovering Risk in a Warming World 2013-10
Donald-Climate Change, Uncovering Risk in a Warming World 2013-10Donald-Climate Change, Uncovering Risk in a Warming World 2013-10
Donald-Climate Change, Uncovering Risk in a Warming World 2013-10
 
Lininger-Property & Casualty Legislative Up-date 2013-10
Lininger-Property & Casualty Legislative Up-date 2013-10Lininger-Property & Casualty Legislative Up-date 2013-10
Lininger-Property & Casualty Legislative Up-date 2013-10
 
Waite- Flood IRT Balto 10_2012
Waite- Flood IRT Balto 10_2012Waite- Flood IRT Balto 10_2012
Waite- Flood IRT Balto 10_2012
 
Shields- Equity View IRT Balto 10_2012
Shields- Equity View IRT Balto 10_2012Shields- Equity View IRT Balto 10_2012
Shields- Equity View IRT Balto 10_2012
 
LaCroix- D&O IRT Balto 10-2012
LaCroix- D&O IRT Balto 10-2012LaCroix- D&O IRT Balto 10-2012
LaCroix- D&O IRT Balto 10-2012
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Hal White 2010 Fowler Seminar
Hal White 2010 Fowler SeminarHal White 2010 Fowler Seminar
Hal White 2010 Fowler Seminar
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Dan Hausmann 2010 Fowler Seminar
Dan Hausmann 2010 Fowler SeminarDan Hausmann 2010 Fowler Seminar
Dan Hausmann 2010 Fowler Seminar
 
Sabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler SeminarSabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler Seminar
 
Ron Adams 2010 Fowler Seminar
Ron Adams 2010 Fowler SeminarRon Adams 2010 Fowler Seminar
Ron Adams 2010 Fowler Seminar
 

Último

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 

Último (20)

SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 

Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson, RPS Technology & Cyber

  • 1. Discussing Cyber Risk Coverage With Your Commercial Clients Steve Robinson Area President RPS Technology & Cyber October 17, 2014
  • 2. Threat Landscape and Common Misperceptions
  • 3. Facts  When it comes to data breach, size doesn’t matter*  It’s more than just hacking  The “we’ve got this covered” attitude is waning  IT is now very much on board *Source: 2013 Data Breach Investigations Report Verizon RISK Team, et al
  • 4. The Changing Threat Landscape “Our 2013 findings suggest that there’s a lot of complacency among organizations about the risk of espionage attacks. The assumption is that these attacks only target government, military and high-profile organizations, but our data shows that this increasingly isn’t true. Don’t underestimate the likelihood that your organization will be a target..” Source: 2013 Data Breach Investigations Report Verizon RISK Team, et al RPS Technology & Cyber
  • 5. Information Risks – What Can Go Wrong?
  • 6. Information Risks Hazards  Hacker Attacks/Unauthorized Access  Virus/Malicious Code  Denial of Services Attacks  Malicious Hardware  Physical Theft of Device/Media  Accidental Release  Employee/Vendor Error  Rogue Employees  Social Engineering
  • 7. Information Risks Source: Open Security Foundation
  • 9. Industry-Specific Threats Healthcare Retail Education Hospitality Financial Public Entity Nonprofit Mfg Technology RPS Technology & Cyber Breach of Personally Identifiable Info (PII) Breach of credit card data & PCI Fines Breach of Protected Health Information (PHI) Breach of customers’ rights to privacy Breach of confidential employee data eBusiness Interruption Technology Errors or Omissions Personal Injury – Social Media Environment Intellectual Property Infringement Regulatory Liability Electronic Theft Cyber Extortion
  • 10. Cost of a Data Breach
  • 11. Data Breach Related Costs  Average cost per compromised record = $201.00*  Direct  Coordination  Defense  Notification expenses  Credit monitoring  Regulatory fines  Indirect  Customer churn  Impact on shareholder value  Loss of future opportunity Source: Ponemon Institute 2013 Annual Study “Cost of a Data Breach”
  • 12. Related Costs Per Capita Cost By Industry Classification* Source: Ponemon Institute 2013 Annual Study “Cost of a Data Breach”
  • 13. Mitigating Risk in our Clients’ Businesses
  • 14. How Can Clients Reduce Their Risk?  Data Management*  Collection  What employee, customer, donor/volunteer (nonprofits) data are you storing?  Do you need to store it?  Access  Who in your organization has access to sensitive information?  Do those with access absolutely need access to perform their job?  What of this information is publically available?  Use  Are you using customer info in a manner it was originally intended (and consistent with the way you communicated to your customers?)  Storage  Where is your data stored?  Is the stored information protected by access controls?  Does sensitive customer information exist in multiple formats?  Eradication  How long do you keep customer information?  What do you do with info (in any format) you no longer need?  3rd party vendor agreements for document storage, disposal, janitorial services, etc. Source: NTEN – Nonprofit Technology Network
  • 15. How Can Clients Reduce Their Risk?  Policies & Procedures  Privacy  Do you have a written privacy policy in place?  Have employees and/or volunteers been trained?  Social Media  Inventory your social media presence - regularly  Restrict authority for creation and content management on behalf of your organization to one or two designated employees  Are there restrictions for social media access on systems that connect to your network containing personal information on customers, employees, etc.?  Websites, Intellectual Property & Electronic Communication  Consistency of content and message?  Legal review?  Have appropriate rights been secured (music, lyrics, video, etc.)  Staff training in email etiquette  Network Security  Software, patch management, spam filters, firewall protection, etc. & Credentialing  Encryption of data - at rest and in a mobile state  Vulnerability testing  BYOD policies
  • 16. How Can Clients Reduce Their Risk?  Risk Transfer  Vendor Agreements  Appropriate transfer of liability language in vendor contracts?  Cloud providers  Payment processors  Website hosting services  Document disposal, storage and janitorial services  Insurance  Cyber/Privacy Liability Insurance
  • 18. What is Cyber Risk Insurance?  Insurance coverage designed to protect a business from:  Liability associated with: • Unauthorized release of confidential information • Violation of a person’s rights to privacy • Personal injury in an electronic/social media environment • Intellectual property infringement • Violations of state or federal privacy laws  Out-of-pocket expenses incurred to make the above problems go away
  • 19. Cyber Risk Insurance RPS Technology & Cyber Exposure Category Description Privacy Liability Provides liability coverage for failure to protect electronic or non-electronic information in your care custody and control. Can include coverage for acts of vendors as well. Network Security Liability Provides liability coverage if an Insured's Computer System fails to prevent a Security Breach, becomes inaccessible to those who need it or unintentionally transmits a virus to a 3rd party. Media Content Liability Provides liability coverage for Intellectual Property and Personal Injury lawsuits stemming from your website or social media content under your direct control. Regulatory Liability Defense coverage for legal proceedings or investigations by Federal, State, or Foreign regulators relating to Privacy Laws. Crisis Management Legal Assistance Expense Expenses incurred to hire an attorney to help navigate the breach response process in accordance with the multitude of State and federal laws. Forensic Expense Expenses incurred to hire a firm to conduct IT forensics investigations following a data breach. Notification Expense Expenses incurred to notify members of a breach in accordance with State and Federal laws. Credit Monitoring Expense Expenses incurred to provide donors with access to identity protection services. Public Relations Expense Expenses incurred to hire a public relations consultancy, media expenses, etc. in the wake of a data breach. Data Recovery/Restoration Expenses incurred to re-create data that is damaged as a result of a cyber incident. Business Interruption The reduction of business income as a result of an interruption or use of a computer system as a result of a network breach to their system. Cyber Extortion Expenses incurred resulting from threats to introduce a system hack, virus, etc. or from threats to disseminate or use information contained in your computer systems to destroy or alter your computer systems. Fines and Penalties Where permissible by law, expenses incurred as a result of a State, Federal or other (PCI DSS) fine or penalty resulting from a data breach.
  • 20. Doesn’t My Insurance Already Cover This?
  • 21. ISO General Liability Form Coverage exclusion for claims of copyright, trademark infringement.
  • 22. ISO Property Form Protects physical computers but not the data that is stored on them.
  • 23. CGL Data Breach Exclusions Current ISO CGL form coverage is provided: “For personal and advertising injury as the offense of an oral or written publication in any manner, or material that violates a person’s right of privacy.” New ISO GL Exclusion (effective May 2014): “Exclusion – Access or Disclosure of confidential or personal information and data-related liability – with limited bodily injury exception.”
  • 24. Doesn’t My Insurance Cover This? General Liability Property Crime Professional K&R Cyber 3rd Party Privacy/Network Security/Personal Injury/IP Theft/Unauthorized Disclosure PII Breach of Confidential Corporate Info Technology E&O Media Liability/Social Networking Regulatory Defense/Penalties Virus/Malicious Code Transmission 1st Party Privacy / Network Risks Legal Assistance/Breach Coach IT Forensics Physical Damage to Data Denial of Service Attack Business Income from Security Event Extortion or Threat Rogue Employee - Data Related Public Relations/Crisis Management Coverage Provided? Coverage Possible? No Coverage? * For reference and discussion only; policy language and facts of claim will require further analysis. This is not a guarantee of coverage.
  • 25. Cyber Risk Coverage: Key Differentiators RPS Technology & Cyber
  • 26. Cyber Risk Coverage  Samples of Key Differentiators:  Look carefully at the definitions  Unauthorized acts of employees  Coverage for electronic and non-electronic information  Vicarious liability - 3rd parties/vendors/cloud providers  Defense of privacy regulatory actions (at full privacy limits)  Regulatory fines & penalties  Sublimits for 1st party vs full limits  Breadth of media coverage
  • 27. Cyber Risk Coverage  Common Exclusions  Intentional Acts – look closely here  Infrastructure failure  Software Responsibility/Inadequate Software  Unencrypted portable media  Wrongful Collection  Employment Practices
  • 28. Not All Policies Are Created Equal
  • 30. Application Process & Rating Factors
  • 31. Application Process & Rating Factors  Pricing  Class of business • High/Medium/Low • Number of patients and records held – medical  Annual revenue  Number of employees  Network defense parameters in place and update procedures  Information security policies  Loss history  Application  New streamlined options available
  • 33. Coverage Trends  The tale of two worlds  Large retail – appetite, capacity, underwriting  Small business  Business Interruption triggers  Aggregation  Reputational Harm  Electronic Theft – monetary & otherwise  Retro date
  • 34. Summary  Why Your Client Needs Cyber Risk Coverage  Specific exclusions exist in traditional policies for: • Privacy breach • Network related incidents • eBusiness Interruption • Personal Injury in Social Media, websites, blogs, etc. • Regulatory defense, fines  Buying coverage aligns pre and post-breach resources not afforded under other policies  Claims are on the rise  Laws are driving demand: • GLB, HIPAA, HI-TECH Act, FTC’s Red Flag Rule, etc. • 47 of 50 States require notification  Coverage is more accessible and affordable than ever
  • 35. Thank You Steven R. Robinson Area President Steven_Robinson@RPSins.com www.RPSins.com 410-901-0704 direct 800-336-5659 toll free