SlideShare una empresa de Scribd logo
1 de 29
ISO 27102: Information
Security Management
Guidelines for Cyber
Insurance.
Keith Spencer
Certified Lead Auditor for ISO 41001 and
45001 Management System Standards
Principal Consultant & Trainer, Cerebrii
Solutions Global
Current state of Cyber-threats and the insurance sector
Overview of ISO 27102: 2019 Guidelines for Cyber-insurance
01
02
03 Questions & Answers
04
Current State of Cyber-threats and the Insurance Sector
Latin America &
Caribbean Experience
• Cyberattacks in the region have been increasing,
mainly targeting LAC financial institutions.
• The COVID-19 pandemic and the increase in digital
activity that has been generated in the region, has
further exposed the vulnerabilities of the digital
space in LAC.
• The ThreatMetrix Cybercrime Report identified Latin
America as a focus for account creation fraud, with
around 20 percent of the total volume against an
industry average of 12.2 percent.
Internet Penetration in Selected Territories -2021
Territory Residents Internet Users Penetration
Antigua and Barbuda 98,731 79,731 80.8%
Barbados 287,711 234,659 81.6%
Dominica 72,167 51,992 72.0%
Grenada 113,021 74,000 65.5%
Jamaica 2,973,463 1,600,520 53.8%
SVG 111,263 78,900 70.9%
Trinidad and Tobago 1,403,375 1,063,630 75.8%
Source: https://www.internetworldstats.com/carib.htm. Accessed March 31, 2022
Information Security Plan
01.
Rigorous Employee Training
03.
Incident Response Plan
02.
Cyber-insurance
04.
Business Continuity Plan
Overview of ISO 27102 Guidelines for Cyber-insurance
Cyber-insurance Moment of Truth
Will cyber-insurance automatically
protect against the risks?
How can we be certain that
customers are playing their part to
maintain the cover provided?
For Insureds For Insurers
The cyber-insurance Dilemma
• Most insurance products are based on decades of
aggregated and actuarial data
• Assessing cyber risks and pricing cyber-insurance
products is difficult because of the evolving cyber
landscape and lack of historical data available to
actuaries
• In the absence of an appropriate analysis of the cyber
risk exposure, organisations can either end up with
insufficient insurance cover, or paying additional
premium for a larger cover which may not be required.
[KPMG]
What is ISO 27102?
“ISO 27102 provides guidelines for
adopting cyber-insurance as a risk
treatment option to manage the impact
of a cyber incident within the
organisation’s information security risk
management framework”
Purpose of ISO 27102
To structure the cyber insurance
situation by focusing on the insured
and outlining the different procedures
that can be implemented by insureds
as part of the measures that insurers
are likely to need.
Approach of ISO 27102
Examines the types of losses that are
insured and the safeguards that
insureds should implement to
accommodate insurance companies.
Main Clauses of ISO 27102: 2019
07 08
05 06
Provides information
and a general
description of cyber-
insurance
Cyber-insurance
Generic risk assessment
an insurer typically
undertakes as part of
its cyber-insurance
underwriting
Risk Assessment
Cyber-risks that can be
covered under a cyber-
insurance policy.
Cyber-risks
Information security
management system
data, information,
and documentation
to be shared with
insurer
Information Security Management System
 Defines cyber-insurance as a risk treatment
option
 Outline purpose/benefits of Cyber-insurance
 Provides examples of typical losses covered
 Insured to demonstrate compliance with
conditions imposed by the cyber-insurance
policy in relation to on-going management of
the covered cyber risks.
5. Overview of cyber-insurance and
cyber-insurance policy
Examples of Cyber-incidents
Data breaches Business Interruption Network Damage
Cyber-insurance Policy
Policy can be either stand-alone or be included
as special endorsements to a general liability,
property, or other insurance policy
Policies are not standardized and depends on
the circumstances
Examples of impacts covered [loss of
confidentiality/integrity/information/systems]
5. Overview of cyber-insurance and
cyber-insurance policy
Cyber-insurance Policy
Covers additional costs:
 Evaluating impact of the attack
 Implementation of response and recovery
plans
 Legal expertise
 Forensics expertise
 Public relations and communications
support
 Customer notification
 Post incident business restoration.
5. Overview of cyber-insurance and
cyber-insurance policy
Expands on Clause 5
Risk management processes for cyber-
insurance
Gives more details on cyber-incident types
Expands on business impact and insurable
losses
Expands on the types of coverage, liability,
incident response costs, loss, theft or damage
to information.
Reputational damage and additional cost
covered
6. Cyber-risk and insurance coverage
Operational cost to manage incidents
Cyber-extortion costs
Business interruption
Legal and regulatory penalties
Contractual penalties
System damage
6. Cyber-risk and insurance coverage
>
Supplier risks
Silent or non-affirmative coverage
Vendors and counsel for incident response
Cyber-insurance policy exclusions
6. Cyber-risk and insurance coverage
Coverage amount limits
>
Clause 7 provides guidelines on underwriting of
the Cyber-insurance policy and pricing
Information collection
Cyber-risk assessment of the insured
Review of prior loss
7. Risks assessment supporting cyber-
insurance underwriting
>
Clause 8 provides guidelines on how the
Information Security Management System
can support Cyber-insurance
Linkage to ISO/IEC 27001 – Information
Security Techniques – Information Security
Management Systems Requirement
ISO/IEC designed to establish, implement,
maintain, and continually improve
information security
ISMS provides information for the cyber-
insurance cover
8. Role of ISMS in support of cyber-
insurance
>
Clause 8 provides guidelines on how the
Information Security Management System
can support Cyber-insurance
Planning – the insured determines what
risk to address
Support activities – awareness and training,
Information security policy, communication
Operation – plan and control, documented
information, change control, vendor
management
8. Role of ISMS in support of cyber-
insurance
>
Clause 8 provides guidelines on how the
Information Security Management System
can support Cyber-insurance
Performance evaluation – provides data on
the effectiveness of the ISMS
Improvement – addressing non-conformities
Sharing information about risks and
controls
8. Role of ISMS in support of cyber-
insurance
Meeting cyber-insurance policy obligations
Questions & Answers
This is a sample text. Insert your desired text
for this label of data.
This is a sample text. Insert your desired text
for this label of data.
(868) 498-9930
info@cerebriisolutions.global
www.cerebriisolutions.global/

Más contenido relacionado

Similar a An Overview of ISO 27102 - Information security management guidelines for cyber insurance.pptx

Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Rochester Security Summit
 
Information security adds value
Information security adds valueInformation security adds value
Information security adds valueKMD
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards ComplianceDr. Prashant Vats
 
Cyber Security and Cloud Security
Cyber Security and Cloud SecurityCyber Security and Cloud Security
Cyber Security and Cloud SecurityIT Governance Ltd
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptxControlCase
 
RiskWatch for Credit Unions™
RiskWatch for Credit Unions™RiskWatch for Credit Unions™
RiskWatch for Credit Unions™CPaschal
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 
Cyber Risk and Marine Insurance
Cyber Risk and Marine InsuranceCyber Risk and Marine Insurance
Cyber Risk and Marine InsurancePeter Hulyer
 
apidays Singapore 2023 - Securing and protecting our digital way of life, Ver...
apidays Singapore 2023 - Securing and protecting our digital way of life, Ver...apidays Singapore 2023 - Securing and protecting our digital way of life, Ver...
apidays Singapore 2023 - Securing and protecting our digital way of life, Ver...apidays
 
Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15James Fisher
 
Infocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationInfocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationEthos Media S.A.
 
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docxForm Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docxalisondakintxt
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan
 

Similar a An Overview of ISO 27102 - Information security management guidelines for cyber insurance.pptx (20)

Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)
 
Information security adds value
Information security adds valueInformation security adds value
Information security adds value
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
 
Cyber Security and Cloud Security
Cyber Security and Cloud SecurityCyber Security and Cloud Security
Cyber Security and Cloud Security
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
RiskWatch for Credit Unions™
RiskWatch for Credit Unions™RiskWatch for Credit Unions™
RiskWatch for Credit Unions™
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Cyber Risk and Marine Insurance
Cyber Risk and Marine InsuranceCyber Risk and Marine Insurance
Cyber Risk and Marine Insurance
 
apidays Singapore 2023 - Securing and protecting our digital way of life, Ver...
apidays Singapore 2023 - Securing and protecting our digital way of life, Ver...apidays Singapore 2023 - Securing and protecting our digital way of life, Ver...
apidays Singapore 2023 - Securing and protecting our digital way of life, Ver...
 
Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15
 
Cyber threat forecast 2018..
Cyber threat forecast 2018..Cyber threat forecast 2018..
Cyber threat forecast 2018..
 
CDCATInsurance 2016
CDCATInsurance 2016CDCATInsurance 2016
CDCATInsurance 2016
 
Infocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationInfocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar Presentation
 
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docxForm Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
 
NCVO/Zurich webinar: Beyond cyber essentials
NCVO/Zurich webinar: Beyond cyber essentialsNCVO/Zurich webinar: Beyond cyber essentials
NCVO/Zurich webinar: Beyond cyber essentials
 

Último

👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 

Último (20)

👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 

An Overview of ISO 27102 - Information security management guidelines for cyber insurance.pptx

  • 1. ISO 27102: Information Security Management Guidelines for Cyber Insurance. Keith Spencer Certified Lead Auditor for ISO 41001 and 45001 Management System Standards Principal Consultant & Trainer, Cerebrii Solutions Global
  • 2. Current state of Cyber-threats and the insurance sector Overview of ISO 27102: 2019 Guidelines for Cyber-insurance 01 02 03 Questions & Answers 04
  • 3. Current State of Cyber-threats and the Insurance Sector
  • 4.
  • 5.
  • 6. Latin America & Caribbean Experience • Cyberattacks in the region have been increasing, mainly targeting LAC financial institutions. • The COVID-19 pandemic and the increase in digital activity that has been generated in the region, has further exposed the vulnerabilities of the digital space in LAC. • The ThreatMetrix Cybercrime Report identified Latin America as a focus for account creation fraud, with around 20 percent of the total volume against an industry average of 12.2 percent.
  • 7. Internet Penetration in Selected Territories -2021 Territory Residents Internet Users Penetration Antigua and Barbuda 98,731 79,731 80.8% Barbados 287,711 234,659 81.6% Dominica 72,167 51,992 72.0% Grenada 113,021 74,000 65.5% Jamaica 2,973,463 1,600,520 53.8% SVG 111,263 78,900 70.9% Trinidad and Tobago 1,403,375 1,063,630 75.8% Source: https://www.internetworldstats.com/carib.htm. Accessed March 31, 2022
  • 8.
  • 9. Information Security Plan 01. Rigorous Employee Training 03. Incident Response Plan 02. Cyber-insurance 04. Business Continuity Plan
  • 10. Overview of ISO 27102 Guidelines for Cyber-insurance
  • 11. Cyber-insurance Moment of Truth Will cyber-insurance automatically protect against the risks? How can we be certain that customers are playing their part to maintain the cover provided? For Insureds For Insurers
  • 12. The cyber-insurance Dilemma • Most insurance products are based on decades of aggregated and actuarial data • Assessing cyber risks and pricing cyber-insurance products is difficult because of the evolving cyber landscape and lack of historical data available to actuaries • In the absence of an appropriate analysis of the cyber risk exposure, organisations can either end up with insufficient insurance cover, or paying additional premium for a larger cover which may not be required. [KPMG]
  • 13. What is ISO 27102? “ISO 27102 provides guidelines for adopting cyber-insurance as a risk treatment option to manage the impact of a cyber incident within the organisation’s information security risk management framework”
  • 14. Purpose of ISO 27102 To structure the cyber insurance situation by focusing on the insured and outlining the different procedures that can be implemented by insureds as part of the measures that insurers are likely to need.
  • 15. Approach of ISO 27102 Examines the types of losses that are insured and the safeguards that insureds should implement to accommodate insurance companies.
  • 16. Main Clauses of ISO 27102: 2019 07 08 05 06 Provides information and a general description of cyber- insurance Cyber-insurance Generic risk assessment an insurer typically undertakes as part of its cyber-insurance underwriting Risk Assessment Cyber-risks that can be covered under a cyber- insurance policy. Cyber-risks Information security management system data, information, and documentation to be shared with insurer Information Security Management System
  • 17.  Defines cyber-insurance as a risk treatment option  Outline purpose/benefits of Cyber-insurance  Provides examples of typical losses covered  Insured to demonstrate compliance with conditions imposed by the cyber-insurance policy in relation to on-going management of the covered cyber risks. 5. Overview of cyber-insurance and cyber-insurance policy
  • 18. Examples of Cyber-incidents Data breaches Business Interruption Network Damage
  • 19. Cyber-insurance Policy Policy can be either stand-alone or be included as special endorsements to a general liability, property, or other insurance policy Policies are not standardized and depends on the circumstances Examples of impacts covered [loss of confidentiality/integrity/information/systems] 5. Overview of cyber-insurance and cyber-insurance policy
  • 20. Cyber-insurance Policy Covers additional costs:  Evaluating impact of the attack  Implementation of response and recovery plans  Legal expertise  Forensics expertise  Public relations and communications support  Customer notification  Post incident business restoration. 5. Overview of cyber-insurance and cyber-insurance policy
  • 21. Expands on Clause 5 Risk management processes for cyber- insurance Gives more details on cyber-incident types Expands on business impact and insurable losses Expands on the types of coverage, liability, incident response costs, loss, theft or damage to information. Reputational damage and additional cost covered 6. Cyber-risk and insurance coverage
  • 22. Operational cost to manage incidents Cyber-extortion costs Business interruption Legal and regulatory penalties Contractual penalties System damage 6. Cyber-risk and insurance coverage
  • 23. > Supplier risks Silent or non-affirmative coverage Vendors and counsel for incident response Cyber-insurance policy exclusions 6. Cyber-risk and insurance coverage Coverage amount limits
  • 24. > Clause 7 provides guidelines on underwriting of the Cyber-insurance policy and pricing Information collection Cyber-risk assessment of the insured Review of prior loss 7. Risks assessment supporting cyber- insurance underwriting
  • 25. > Clause 8 provides guidelines on how the Information Security Management System can support Cyber-insurance Linkage to ISO/IEC 27001 – Information Security Techniques – Information Security Management Systems Requirement ISO/IEC designed to establish, implement, maintain, and continually improve information security ISMS provides information for the cyber- insurance cover 8. Role of ISMS in support of cyber- insurance
  • 26. > Clause 8 provides guidelines on how the Information Security Management System can support Cyber-insurance Planning – the insured determines what risk to address Support activities – awareness and training, Information security policy, communication Operation – plan and control, documented information, change control, vendor management 8. Role of ISMS in support of cyber- insurance
  • 27. > Clause 8 provides guidelines on how the Information Security Management System can support Cyber-insurance Performance evaluation – provides data on the effectiveness of the ISMS Improvement – addressing non-conformities Sharing information about risks and controls 8. Role of ISMS in support of cyber- insurance Meeting cyber-insurance policy obligations
  • 28. Questions & Answers This is a sample text. Insert your desired text for this label of data. This is a sample text. Insert your desired text for this label of data.