Making the connection on data breach complexities g p
Beazley Breach Response Select
1
Beazley Breach Response Select p g Making the connection on data - - PDF document
1 Making the connection on data breach complexities Beazley Breach Response Select p g Making the connection on data breach complexities P Presented by d b Jeffrey Norton underwriter Jeffrey Norton, underwriter, Beazley US Private
1
Jeffrey Norton underwriter
Jeffrey Norton, underwriter, Beazley US Private Enterprise Technology, Media & Business Services team jeffrey.norton@beazley.com jeffrey.norton@beazley.com Marcello Antonucci, claims manager, Beazley US Technology, Media & Business Services team Business Services team marcello.antonucci@beazley.com
2
Coverage misconceptions
3
Th U S Ch b f C ti t th t
employee theft costs American employers more than $50 billion dollars each year, and
attributed to employee dishonesty...
much as US$1 billion a year from SMBs in the United States and Europe alone. Source: TrendMicro
US Secret Service shows 63 percent of last year’s breaches involved organizations with less than 100 employees less than 100 employees.
4
5
6
Response costs add up for a com pany w ith lim ited cash flow Costs for a small business can be as much as that faced by a larger company:
breach response, so they are more likely to have to pay outside experts such as attorneys, consultants, crisis management and public relations professionals to assist.
p y g
breach -- can range from $ 1 0 ,0 0 0 to $ 1 0 0 ,0 0 0 - whatever size the business.
been breached or potentially breached -an estimated $ 2 0 0 ,0 0 0 in costs associated with breach response services.
7
Direct Data Breach Costs in 2 0 1 0
p p
fallout) (U.S. Cost of a Data Breach Study, PGP Corporation and Ponemon Institute, 2011) S ll b i t i ll h l i t l d ti t h dl
breach response, so they are more likely to have to pay outside experts such as attorneys, consultants, crisis management and public relations professionals.
control is critical control is critical.
8
Regulatory I nvestigations & Third-Party Claim s
y
tempting lure for putative class actions.
R l t di lt i fi d ti ti l th t i
significant expenditures on administrative, technical, and physical safeguards for data.
least, cost a lot of money to defend. AI M of BBR Services: m itigate any potential regulatory investigations and respond clearly and w ith confidence
9
How Do Breaches Occur?
s g s a s ( g a p ), a d as g y, Sp a s g (so a engineering)
network)
10
Exam ples of Publically Reported Breaches ( continued)
used default usernames and passwords on its point-of-sale system, which were shared
by employees on an unsecured w ifi netw ork. Malware quickly made its way onto the network, and several custom ers began experiencing credit card fraud. The Massachusetts Attorney General learned of the incident from affected customers, and filed a lawsuit resulting in a $ 1 1 0 ,0 0 0 penalty and mandatory compliance with the rigorous Payment Card Industry Data Security Standards. g y y y
were stolen from an employee's car when he took information home to do after-hours
were on the handheld device, along with 1,194 current or former employees. Credit it i l f b h f thi i ld t i ll d $100 000 m onitoring alone for a breach of this size would typically exceed $100,000.
11
Exam ples of Publically Reported Breaches
hackers breach its computer network, infiltrating a server where e-mails and electronic
medical records were stored. Hackers encrypted access to the system, and tried to exhort m oney from SLC in exchange for the decryption key. Hackers threatened to start spamming pornography from SLC's email addresses if not paid within 72 hours. SLC had to purge all systems and notify over 7 ,0 0 0 patients of the incident.
appointments for its patients on an Internet-based calendar that was publicly
the incident to federal regulators. In turn, regulators fined PCS $ 1 0 0 ,0 0 0 , and instituted a m andatory corrective action plan with the ability to audit PCS for six years. Just the tip of the iceberg: in five out of every six breaches, the infiltration rem ained undetected for w eeks at a tim e. See, “2 0 1 2 Data Breach I nvestigations Report,” Verizon Com m unications, at 3 ( 2 0 1 2 ) ( http:/ / bit ly/ GFfpdk) ( http:/ / bit.ly/ GFfpdk) .
12
5) Most breaches happen to big companies 4) The cost to respond to a breach is a postage stamp to mail a letter
) p p g p 3) Our information is well-protected by our IT consultants 2) My employees would never act maliciously, and know how to protect our data
And the top m isconception is…
13
14
Our top tw o reasons: p
1)
Very few businesses have the resources to manage a breach (we do it all!)
2)
Notify by number of affected individuals outside the liability limit
15
health record restoration services, call center services
but most companies don’t have the in-house expertise to respond to a breach. You can be confident in our breach response services!
footedly to protect its reputation with its customers. Your client can be confident in our breach response services!
16
17
18
individuals basis not a dollar amount 25 000; 50 000 or up to 100 000 limits for individuals basis, not a dollar amount. 25,000; 50,000 or up to 100,000 limits for most small businesses make it easy to ensure adequate limits!
are very different from liability claims (a large breach will not exhaust the policy y y ( g p y liability limits!)
and data security policy information, email alerts of key legal and regulatory developments and expert on line support for client questions on data security issues developments, and expert on-line support for client questions on data security issues.
and public relations, Red Flags Rule coverage, and much, much more!
19
event of a data breach.
Higher education or K 12 schools
20
Penalties limits offered:
Public Relations limits offered:
Minimum retention:
espo se tea
21
22
23
24
The descriptions contained in this presentation are for preliminary informational The descriptions contained in this presentation are for preliminary informational purposes only. The exact coverage afforded by the products described herein is subject to and governed by the terms and conditions of each policy issued. The publication and delivery of the information contained herein is not intended as a solicitation for the purchase of insurance on any US risk.
25