SlideShare a Scribd company logo
1 of 22
Download to read offline
Does it pay to be cyber-insured
Dr. Marie Moe
Research Scientist, SINTEF ICT, @MarieGMoe
Mr. Eireann Leverett
Founder and CEO, Concinnity Risks, @blackswanburst @concinnityrisks
Key issues
• Where do insurance companies best fit in to
the incident response lifecycle?
• How can CERTs collaborate with insurance
companies to mitigate and minimise costs of
cyber incidents?
• What language do CERTs need to speak to
interact efficiently with insurers?
• Why modelling is important
Myths and Facts
• They	already	have.	*cough*	German	Steel	Mill	*cough*They	won’t	pay	out
• If	you	can’t	attribute,	how	can	they?
Cyber	war/nation	
state/APT	is	excluded
• It	should	come	from	your	POST	incident	budget
• You	do	divide	budget	into	PRE	and	POST,	right?
It	steals	my	security	
budget
• They	hire	us,	as	the	market	grows
• They’re	not	fire,	auto,	or	aircraft	experts	either
• They	progress	the	art	of	security	at	higher	abstraction
They	don’t	know	
anything
Traditional risk management
accept	 reduce	
share avoid
You	know	this	story	already:
v too	much	acceptance,	
v a	little	reduction,	
v a	pinch	of	avoidance
v hardly	any	sharing.
So	let’s	play	what	if…
What if we share:
cyber-insurance
Cyber:
•Breach
•DDoS
•Business	Interruption
•Contingent	Business	
Interruption
•Financial	Fraud
•Ransom/Ransomware
•OT	(physical	damage	in	
engineering	lines)
Traditional
• Material	Damage
• Directors	and	Officers
• Commercial	General	
Liability
• Construction
• Life
• Event	cancellation
Example: Cloud outage
Source:	https://forums.aws.amazon.com/thread.jspa?threadID=65649
T1
T2
T3
Consequence	/	SLE
Likelihood	/	ARO
R
Treatment	effect
Treatment	cost
Cyber-insurance in risk
management
• SLE: Single loss expectancy
• ARO: Annual rate of occurrence
• ALE: Annualized loss expectancy
7
ALE
Acceptance
R T1 T2 T3
Insurance
Treatment
Risk
Exclusions matter
• Without “cyber exclusions” traditional insurance
covers cyber losses.
• THINK ABOUT THAT
• My lawyer got hit by ransomware…
• Travelers Insurance vs Portal Healthcare
Solutions…
• Let’s talk about FLEXA
Cyber Exclusions for
Traditional Insurance
• NMA 2912 AND 2928
• NMA 2912 excludes losses arising out of the "(i) loss of, alteration of, or damage to, or (ii)
a reduction in the functionality, availability or operation of" computer systems, hardware,
programs, software, data information repository, microchip, integrated circuit or similar
devices in computer equipment or non-computer equipment
• NMA 2914 AND 2915
• NMA 2914 and 2915 exclude loss, damage, destruction, distortion, erasure, corruption or
alteration of electronic data, and any loss of use, reduction in functionality, cost, expense
of whatever nature resulting from that loss of data. Data is defined in the clause, and is
said to include software.
• CL 380
• CL380 is the widest of the exclusions, and is in common usage in upstream energy
policies. It excludes all loss, damage and liability directly or indirectly caused by,
contributed to by, or arising from, the use or operation "as a means for inflicting harm" of
any computer, computer system, computer software program, malicious code, computer
virus or process or any other electronic system.
• ADVANCED CYBER EXCLUSION CLAUSES BEING DRAFTED
Why should CERTs care about
cyber-insurance?
• A common interest in detection, response and
prevention of loss
• A new strong stakeholder in the threat
intelligence and info sharing “market”
• Outsourcing of risk
• Outsourcing/collaboration on CERT services
• Business opportunities in partnering with
insurance companies
How do insurers choose their
customers?
Key	risk	
factors
Constraints
Making	
compro-
mises
• Key	information	 to	collect
• Key	measures	to	monitor
• Accumulated	risk
• Catastrophic	event	risk
• In-house	competence
• Available	data
• Building	customer	base
• Efficient	processes	vs	trust	in	data
• 3rd	parties	vs	in-house	capacity
• Baseline	requirements	vs	sales
Speaking different languages/
Learning to collaborate
They	need	your	
data	to	make	
models
• This	brings	down	
the	cost
We	need	some	
of	their	cash	
and	enthusiasm
They	need	our:
• Training
• Services
• Data
• History
• Collaboration
We	need	their	
patient	market	
interventions
They	need	our
expertise	when
evaluating	the	
risk	of	their	
customers
Interfaces in other teams
Build	interfaces	today	with	insurers
Initially	through	Marie	and	
Eireann
They	might	
give	you	
work
Or	might	
take	work	
from	you
Ideally	they	deal	with	boring	incidents
We	get	
more	time	
to	work	on	
emerging	
threats
They	reward	
mitigation	
toolsmithing
They	need	
threat	intel	
and	“near	
miss”	data
Our	DFIR	
innovations	
get	valued!
Cost	
effective
The incident response life cycle
NIST SP 800-61,Revision 2
Where does cyber-insurance
come in to play?
• Triggered	for	large	incidents?
• A	feed	of	incidents	to	work?
Where	do	we	
want	it	to	come	in	
to	play?
• Public	Private	Partnership	management?
• Risk	Models?
Data	sharing?
• Test	Lab	creation?
• Standards	management?
Market	
interventions
16
Intrusion Detection Cleaned up?
When to report?
• Think about two reports: insurance and CERT
• Most reporting happens after an incident has
been detected
• Insurers offer rapid-response services to quickly assess a
possible intrusion after detection
• What about undetected intrusions?
• Reporting of near-misses and prevented incidents gives
valuable threat intelligence
• Customers may be reluctant to disclose their vulnerabilities
• Can insurers provide incentives?
How to calculate the cost of an
incident?
Defender
a) Cost of preparing to respond
b) Cost of response ( b > a)
c) Loss (c >> a+b)
d) Cost of insurance (d > a+b)
e) Insurance payout (e < c)
Attacker
a) Cost of preparing and
executing attack
b) Profit (b >> a)
c) Penalty (c << a+b)
When does it pay to be cyber-
insured?
• When the cost of insurance is lower than the
expected loss
• When insecurity is great and unpredictable
• When the consequences are catastrophic
• When the victim does not have enough
resources to handle the consequences
Cyber-insurance as risk control
strategy
• Risks can be controlled by:
• Avoidance
• Mitigation
• Acceptance
• Termination
• Transfer or share
• What is the benefit of risk transfer?
Conclusions
• It’s here, and paying out
• You might as well meet them, understand
them, learn from them, and teach them
• Watch those exclusions
• Some incidents could be referred to insurers!
• Or costs reclaimed?!?
Questions?
Dr. Marie Moe
@MarieGMoe
marie.moe@sintef.no
Mr. Eireann Leverett
@blackswanburst, @concinnityrisks
eireann.leverett@cantab.net

More Related Content

What's hot

Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)
Alex Yates
 
A W W A Presentation Regional Paper David Mc Cann
A W W A  Presentation    Regional Paper     David  Mc CannA W W A  Presentation    Regional Paper     David  Mc Cann
A W W A Presentation Regional Paper David Mc Cann
Wivenhoe Management Group
 

What's hot (20)

Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 DecXavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
 
MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...
MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...
MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...
 
What is cyber resilience?
What is cyber resilience?What is cyber resilience?
What is cyber resilience?
 
Sensible defence
Sensible defenceSensible defence
Sensible defence
 
Cybersecurity During the COVID Era
Cybersecurity During the COVID EraCybersecurity During the COVID Era
Cybersecurity During the COVID Era
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
 
What to Do Before a Cyber Incident Occurs
What to Do Before a Cyber Incident OccursWhat to Do Before a Cyber Incident Occurs
What to Do Before a Cyber Incident Occurs
 
Cyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapCyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model Roadmap
 
Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
 
Common and Concerning Risks In IT
Common and Concerning Risks In ITCommon and Concerning Risks In IT
Common and Concerning Risks In IT
 
Adequate securitynew1404.019
Adequate securitynew1404.019Adequate securitynew1404.019
Adequate securitynew1404.019
 
Wivenhoe Management Group[2]
Wivenhoe Management Group[2]Wivenhoe Management Group[2]
Wivenhoe Management Group[2]
 
A W W A Presentation Regional Paper David Mc Cann
A W W A  Presentation    Regional Paper     David  Mc CannA W W A  Presentation    Regional Paper     David  Mc Cann
A W W A Presentation Regional Paper David Mc Cann
 
ATOS: Preparing your business to manage cyber incidents
ATOS: Preparing your business to manage cyber incidentsATOS: Preparing your business to manage cyber incidents
ATOS: Preparing your business to manage cyber incidents
 
Ey Asia-Pacific Cyber Case Competition 2019
Ey Asia-Pacific Cyber Case Competition 2019Ey Asia-Pacific Cyber Case Competition 2019
Ey Asia-Pacific Cyber Case Competition 2019
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
Security vulnerability assessment & liability(li)
Security vulnerability assessment & liability(li)Security vulnerability assessment & liability(li)
Security vulnerability assessment & liability(li)
 
Security Awareness: The Best Defence
Security Awareness: The Best DefenceSecurity Awareness: The Best Defence
Security Awareness: The Best Defence
 

Similar to Does it pay to be cyber-insured

SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
Sarah Jarvis
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
Nathan Desfontaines
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
James Fisher
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptx
caniceconsulting
 

Similar to Does it pay to be cyber-insured (20)

Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber risk
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
NCVO/Zurich webinar: Beyond cyber essentials
NCVO/Zurich webinar: Beyond cyber essentialsNCVO/Zurich webinar: Beyond cyber essentials
NCVO/Zurich webinar: Beyond cyber essentials
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptx
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Infocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationInfocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar Presentation
 
Debunking Myths for Cyber-Insurance
Debunking Myths for Cyber-InsuranceDebunking Myths for Cyber-Insurance
Debunking Myths for Cyber-Insurance
 
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
 

More from Marie Elisabeth Gaup Moe

More from Marie Elisabeth Gaup Moe (13)

Cyberforsikring - Når lønner det seg?
Cyberforsikring - Når lønner det seg?Cyberforsikring - Når lønner det seg?
Cyberforsikring - Når lønner det seg?
 
Med hjertet på Internett - Sikkerhet i min personlige infrastruktur
Med hjertet på Internett - Sikkerhet i min personlige infrastrukturMed hjertet på Internett - Sikkerhet i min personlige infrastruktur
Med hjertet på Internett - Sikkerhet i min personlige infrastruktur
 
Når cyberangrep får fysiske konsekvenser
Når cyberangrep får fysiske konsekvenserNår cyberangrep får fysiske konsekvenser
Når cyberangrep får fysiske konsekvenser
 
Unpatchable: Troopers 2016 edition
Unpatchable: Troopers 2016 editionUnpatchable: Troopers 2016 edition
Unpatchable: Troopers 2016 edition
 
From Ukraine to Pacemakers!
From Ukraine to Pacemakers!From Ukraine to Pacemakers!
From Ukraine to Pacemakers!
 
Sikkerhet i Internet of Things
Sikkerhet i Internet of ThingsSikkerhet i Internet of Things
Sikkerhet i Internet of Things
 
Unpatchable: 32C3 edition
Unpatchable: 32C3 editionUnpatchable: 32C3 edition
Unpatchable: 32C3 edition
 
Software Security: Hvordan bygge sikre systemer?
Software Security: Hvordan bygge sikre systemer?Software Security: Hvordan bygge sikre systemer?
Software Security: Hvordan bygge sikre systemer?
 
Unpatchable: Living with a vulnerable implanted device
Unpatchable: Living with a vulnerable implanted deviceUnpatchable: Living with a vulnerable implanted device
Unpatchable: Living with a vulnerable implanted device
 
Informasjonssikkerhet og personvern: Hva må vi tenke på ved tilgjengeliggjøri...
Informasjonssikkerhet og personvern: Hva må vi tenke på ved tilgjengeliggjøri...Informasjonssikkerhet og personvern: Hva må vi tenke på ved tilgjengeliggjøri...
Informasjonssikkerhet og personvern: Hva må vi tenke på ved tilgjengeliggjøri...
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
 
NorCERT - Hva gjør vi når det brenner?
NorCERT - Hva gjør vi når det brenner?NorCERT - Hva gjør vi når det brenner?
NorCERT - Hva gjør vi når det brenner?
 
Er smarte systemer dumme på sikkerhet? -Hvordan ITS krever enda mer intellige...
Er smarte systemer dumme på sikkerhet? -Hvordan ITS krever enda mer intellige...Er smarte systemer dumme på sikkerhet? -Hvordan ITS krever enda mer intellige...
Er smarte systemer dumme på sikkerhet? -Hvordan ITS krever enda mer intellige...
 

Recently uploaded

Recently uploaded (20)

Vip Call Girls Rasulgada😉 Bhubaneswar 9777949614 Housewife Call Girls Servic...
Vip Call Girls Rasulgada😉  Bhubaneswar 9777949614 Housewife Call Girls Servic...Vip Call Girls Rasulgada😉  Bhubaneswar 9777949614 Housewife Call Girls Servic...
Vip Call Girls Rasulgada😉 Bhubaneswar 9777949614 Housewife Call Girls Servic...
 
Benefits & Risk Of Stock Loans
Benefits & Risk Of Stock LoansBenefits & Risk Of Stock Loans
Benefits & Risk Of Stock Loans
 
Escorts Indore Call Girls-9155612368-Vijay Nagar Decent Fantastic Call Girls ...
Escorts Indore Call Girls-9155612368-Vijay Nagar Decent Fantastic Call Girls ...Escorts Indore Call Girls-9155612368-Vijay Nagar Decent Fantastic Call Girls ...
Escorts Indore Call Girls-9155612368-Vijay Nagar Decent Fantastic Call Girls ...
 
Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024
 
Explore Dual Citizenship in Africa | Citizenship Benefits & Requirements
Explore Dual Citizenship in Africa | Citizenship Benefits & RequirementsExplore Dual Citizenship in Africa | Citizenship Benefits & Requirements
Explore Dual Citizenship in Africa | Citizenship Benefits & Requirements
 
Seeman_Fiintouch_LLP_Newsletter_May-2024.pdf
Seeman_Fiintouch_LLP_Newsletter_May-2024.pdfSeeman_Fiintouch_LLP_Newsletter_May-2024.pdf
Seeman_Fiintouch_LLP_Newsletter_May-2024.pdf
 
Kurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
Kurla Capable Call Girls ,07506202331, Sion Affordable Call GirlsKurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
Kurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
 
Virar Best Sex Call Girls Number-📞📞9833754194-Poorbi Nalasopara Housewife Cal...
Virar Best Sex Call Girls Number-📞📞9833754194-Poorbi Nalasopara Housewife Cal...Virar Best Sex Call Girls Number-📞📞9833754194-Poorbi Nalasopara Housewife Cal...
Virar Best Sex Call Girls Number-📞📞9833754194-Poorbi Nalasopara Housewife Cal...
 
W.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdfW.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdf
 
Test bank for advanced assessment interpreting findings and formulating diffe...
Test bank for advanced assessment interpreting findings and formulating diffe...Test bank for advanced assessment interpreting findings and formulating diffe...
Test bank for advanced assessment interpreting findings and formulating diffe...
 
Bhubaneswar🌹Ravi Tailkes ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswar ...
Bhubaneswar🌹Ravi Tailkes  ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswar ...Bhubaneswar🌹Ravi Tailkes  ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswar ...
Bhubaneswar🌹Ravi Tailkes ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswar ...
 
falcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunitiesfalcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunities
 
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech Belgium
 
Call Girls in Benson Town / 8250092165 Genuine Call girls with real Photos an...
Call Girls in Benson Town / 8250092165 Genuine Call girls with real Photos an...Call Girls in Benson Town / 8250092165 Genuine Call girls with real Photos an...
Call Girls in Benson Town / 8250092165 Genuine Call girls with real Photos an...
 
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
 
Fixed exchange rate and flexible exchange rate.pptx
Fixed exchange rate and flexible exchange rate.pptxFixed exchange rate and flexible exchange rate.pptx
Fixed exchange rate and flexible exchange rate.pptx
 
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
 
Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Strategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate PresentationStrategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate Presentation
 

Does it pay to be cyber-insured

  • 1. Does it pay to be cyber-insured Dr. Marie Moe Research Scientist, SINTEF ICT, @MarieGMoe Mr. Eireann Leverett Founder and CEO, Concinnity Risks, @blackswanburst @concinnityrisks
  • 2. Key issues • Where do insurance companies best fit in to the incident response lifecycle? • How can CERTs collaborate with insurance companies to mitigate and minimise costs of cyber incidents? • What language do CERTs need to speak to interact efficiently with insurers? • Why modelling is important
  • 3. Myths and Facts • They already have. *cough* German Steel Mill *cough*They won’t pay out • If you can’t attribute, how can they? Cyber war/nation state/APT is excluded • It should come from your POST incident budget • You do divide budget into PRE and POST, right? It steals my security budget • They hire us, as the market grows • They’re not fire, auto, or aircraft experts either • They progress the art of security at higher abstraction They don’t know anything
  • 4. Traditional risk management accept reduce share avoid You know this story already: v too much acceptance, v a little reduction, v a pinch of avoidance v hardly any sharing. So let’s play what if…
  • 5. What if we share: cyber-insurance Cyber: •Breach •DDoS •Business Interruption •Contingent Business Interruption •Financial Fraud •Ransom/Ransomware •OT (physical damage in engineering lines) Traditional • Material Damage • Directors and Officers • Commercial General Liability • Construction • Life • Event cancellation
  • 7. T1 T2 T3 Consequence / SLE Likelihood / ARO R Treatment effect Treatment cost Cyber-insurance in risk management • SLE: Single loss expectancy • ARO: Annual rate of occurrence • ALE: Annualized loss expectancy 7 ALE Acceptance R T1 T2 T3 Insurance Treatment Risk
  • 8. Exclusions matter • Without “cyber exclusions” traditional insurance covers cyber losses. • THINK ABOUT THAT • My lawyer got hit by ransomware… • Travelers Insurance vs Portal Healthcare Solutions… • Let’s talk about FLEXA
  • 9. Cyber Exclusions for Traditional Insurance • NMA 2912 AND 2928 • NMA 2912 excludes losses arising out of the "(i) loss of, alteration of, or damage to, or (ii) a reduction in the functionality, availability or operation of" computer systems, hardware, programs, software, data information repository, microchip, integrated circuit or similar devices in computer equipment or non-computer equipment • NMA 2914 AND 2915 • NMA 2914 and 2915 exclude loss, damage, destruction, distortion, erasure, corruption or alteration of electronic data, and any loss of use, reduction in functionality, cost, expense of whatever nature resulting from that loss of data. Data is defined in the clause, and is said to include software. • CL 380 • CL380 is the widest of the exclusions, and is in common usage in upstream energy policies. It excludes all loss, damage and liability directly or indirectly caused by, contributed to by, or arising from, the use or operation "as a means for inflicting harm" of any computer, computer system, computer software program, malicious code, computer virus or process or any other electronic system. • ADVANCED CYBER EXCLUSION CLAUSES BEING DRAFTED
  • 10. Why should CERTs care about cyber-insurance? • A common interest in detection, response and prevention of loss • A new strong stakeholder in the threat intelligence and info sharing “market” • Outsourcing of risk • Outsourcing/collaboration on CERT services • Business opportunities in partnering with insurance companies
  • 11. How do insurers choose their customers? Key risk factors Constraints Making compro- mises • Key information to collect • Key measures to monitor • Accumulated risk • Catastrophic event risk • In-house competence • Available data • Building customer base • Efficient processes vs trust in data • 3rd parties vs in-house capacity • Baseline requirements vs sales
  • 12. Speaking different languages/ Learning to collaborate They need your data to make models • This brings down the cost We need some of their cash and enthusiasm They need our: • Training • Services • Data • History • Collaboration We need their patient market interventions They need our expertise when evaluating the risk of their customers
  • 13. Interfaces in other teams Build interfaces today with insurers Initially through Marie and Eireann They might give you work Or might take work from you Ideally they deal with boring incidents We get more time to work on emerging threats They reward mitigation toolsmithing They need threat intel and “near miss” data Our DFIR innovations get valued! Cost effective
  • 14. The incident response life cycle NIST SP 800-61,Revision 2
  • 15. Where does cyber-insurance come in to play? • Triggered for large incidents? • A feed of incidents to work? Where do we want it to come in to play? • Public Private Partnership management? • Risk Models? Data sharing? • Test Lab creation? • Standards management? Market interventions
  • 17. When to report? • Think about two reports: insurance and CERT • Most reporting happens after an incident has been detected • Insurers offer rapid-response services to quickly assess a possible intrusion after detection • What about undetected intrusions? • Reporting of near-misses and prevented incidents gives valuable threat intelligence • Customers may be reluctant to disclose their vulnerabilities • Can insurers provide incentives?
  • 18. How to calculate the cost of an incident? Defender a) Cost of preparing to respond b) Cost of response ( b > a) c) Loss (c >> a+b) d) Cost of insurance (d > a+b) e) Insurance payout (e < c) Attacker a) Cost of preparing and executing attack b) Profit (b >> a) c) Penalty (c << a+b)
  • 19. When does it pay to be cyber- insured? • When the cost of insurance is lower than the expected loss • When insecurity is great and unpredictable • When the consequences are catastrophic • When the victim does not have enough resources to handle the consequences
  • 20. Cyber-insurance as risk control strategy • Risks can be controlled by: • Avoidance • Mitigation • Acceptance • Termination • Transfer or share • What is the benefit of risk transfer?
  • 21. Conclusions • It’s here, and paying out • You might as well meet them, understand them, learn from them, and teach them • Watch those exclusions • Some incidents could be referred to insurers! • Or costs reclaimed?!?
  • 22. Questions? Dr. Marie Moe @MarieGMoe marie.moe@sintef.no Mr. Eireann Leverett @blackswanburst, @concinnityrisks eireann.leverett@cantab.net