introduction to cyber risk insurance
play

Introduction to Cyber Risk & Insurance Prepared for the - PowerPoint PPT Presentation

Introduction to Cyber Risk & Insurance Prepared for the Construction Financial Management Association Date: August 18, 2016 Agenda An Overview of Cyber Risk Exposures 1. Legal & Regulatory Trends 2. Marshs Cyber Risk Management


  1. Introduction to Cyber Risk & Insurance Prepared for the Construction Financial Management Association Date: August 18, 2016

  2. Agenda An Overview of Cyber Risk Exposures 1. Legal & Regulatory Trends 2. Marsh’s Cyber Risk Management Framework 3. Cyber Insurance Coverages 4. 5. Cyber Risk Management Best Practices 1 MARSH

  3. Cyber Attacks – A Growing Global Risk • Costs businesses $400B+ per year • The world is becoming more dependent on the internet – an estimated 50 billion connected devices in the world by 2020 – 6.5 devices for every person on the planet. Source: Marsh & McLennan Companies CYBER RISK HANDBOOK 2015 2 MARSH

  4. Broader Exposures & Threats CYBER BY THE NUMBERS Market Overview Cost of Cyber $5.9 million $446 billion Average cost of a Estimated annual cost data breach in of cybercrime to the US in 2014. global economy. 40% $120 billion Percentage of Expected size of the breaches that global cyber security exceed $500,000 market in 2017. in losses. • Liability to Customers, Key 40 million $1.8 million Vendors and Employees Number of people in Average post- the US who had their • Operational Disruptions breach costs. personal information • Regulatory Scrutiny stolen by hackers in $3.3 million 2014. • Notification Requirements Average lost business costs. • Reputation 3 MARSH

  5. An Evolving & Headlining Risk Headline News WHY IT MATTERS? • Value of Personal Data Target Hacked: Retailer Confirms • Cost of Cyber Breach Unauthorized Access of Credit ($5.9M average) Card Data • Enterprise-Wide Risk Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus non odio non ligula aliquet tempus eu at velit. Donec in viverra libero. Maecenas vel tellus eu Issue enim consectetur euismod. Proin suscipit justo vitae justo sollicitudin pretium. Sed nisl odio, commodo ac leo in, consequat lacinia leo. euismod, quam vel tempus • Difficulty Quantifying the Risk Extramarital Affair Website Ashley • Frequency and Madison Has Been Hacked Severity of Losses Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus non odio non ligula aliquet tempus eu at velit. Donec in viverra libero. Maecenas vel tellus eu enim consectetur euismod. Proin suscipit justo vitae justo sollicitudin pretium. Sed Seen • Regulatory concerns 21.5 Million Exposed in Second Hack of Ransomware Wreaking Havoc in Federal Office American & Canadian Hospitals Lorem ipsum dolor sit amet, consectetur Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus non odio non adipiscing elit. Phasellus non odio non ligula ligula aliquet tempus eu at velit. Donec in viverra libero. Maecenas vel tellus eu aliquet eu at velit. Donec in viverra libero. enim consectetur euismod. Proin suscipit justo vitae justo sollicitudin pretium. Sed nisl odio, commodo ac leo in, consequat lacinia leo. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus non odio non ligula aliquet eu at velit. Donec in viverra libero. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus non odio non ligula aliquet eu at velit. Donec in viverra libero. MARSH 4

  6. Recent Cyber Breaches in Construction 1. Turner Construction (2016) • Spear-phishing scam targeting 41 companies • Employee sent tax information on current and past employees to a fraudulent email account • Information included the full name, social security number, state of residency and tax withholding amounts. 2. Whiting-Turner Contracting (2016) • Vendor hired to perform tax services for Whiting-Turner • Whiting-Turner experienced suspicious activity on their systems and some employees reported fraudulent tax filings in their names • Vendor’s access was shut down and the investigation is ongoing • Potentially exposed information includes names, dates of birth, social security numbers and the names of any minor dependents. 5 MARSH

  7. There are Many Types of Cyber-Vulnerable Assets Financial Assets Brand & Technology Infrastructure Reputation Third-Party Data Cyber- Exposed Corporate IP Physical Assets 6 MARSH

  8. The Threat Environment Technology Internal  Viruses, SQL Injections,  Rogue employees DDoS attacks, etc.  Careless staff Regulatory  Social Media/Networking  BYOD  DHHS - HIPAA  Phishing  SEC, FTC, state attorney generals  47 State breach notification laws (NM External proposed)  Vendors/Suppliers  PCI Compliance (contractors, outside counsel, cloud providers)  Foreign and domestic organized crime Old School  Hackers/Hacktivists  Laptop theft  Dumpster diving  Photocopier 7 MARSH

  9. Types of Data Breaches: 2006 - 2015 Source: Verizon Data breach report 2016 8 MARSH

  10. The Uncontrollable Human Element Source: Verizon Data breach report 2015 9 MARSH

  11. The Reality… 10 MARSH

  12. Cyber Litigation Overview Cyber litigation falls into 3 areas: 1. State Enforcement Actions • The state alleges a failure to provide adequate security for personal information and/or a failure to provide timely notification to affected individuals or the AG’s office • 47 state breach notification laws, with similar but differing requirements 2. Federal Trade Commission Enforcement Actions • FTC Act prohibits “unfair or deceptive acts or practices in or affecting commerce” • Over 50 settlements with companies over the failure to protect personal information of consumers • Wyndham hotels case affirmed FTC’s ability to regulate 3. Civil Suits • Cause of actions include negligence, breach of contract, unfair/deceptive trade practices and violations of privacy/cyber security statutes • Key issue = whether plaintiffs have standing to sue 11 MARSH

  13. Civil Suits – Surviving the Motion to Dismiss Courts are now approving class actions relating to cyber breaches brought by: Consumers • Previously the Supreme Court held that the likelihood of injury to consumers arising from cyber breach is not sufficient to bring a class action 1 • Cases of Adobe 2 and Neiman Marcus 3 found that likelihood of injury was sufficient and allowed class action to proceed Employees • Case of Sony 4 allowed class action brought by employees affected by data breach to proceed Financial institutions • In September 2015 5 banks affected by the Target cyber breach were allowed to proceed with a class action Clapper v Amnesty International 133 S. Ct. at 1147 1. 2. re Adobe Sys. Privacy Litig. No. 13-CV-05226, 2014 U.S. Dist. LEXIS 124126 (N.D. Cal. Sep. 4, 2014) Remijas et al. v. The Neiman Marcus Group LLC , 14-3122, U.S. Court of Appeals 7 th Circuit (July 20, 2015) 3. re Sony Gaming Networks and Customer Data Security ( 996 F. Supp. 2d 942 (S.D. Cal. 2014) 4. 5. re: Target Corporation Customer Data Security Breach Litigation, M DL No. 14-2522, (September 15, 2015) 12 MARSH

  14. Regulatory Trends to Watch… Securities Exchange Commission (“SEC”)  Conducting investigations of public companies regarding:  Adequate disclosure of cyber risks  Proper internal controls to prevent breach  Proper disclosure to market following cyber breach  Target investigated following breaches – no prosecution but significant expenses in responding to investigations  SEC Guidance notes released in April 2015 and September 2015 aimed at investment industry. Highly likely that further guidance will be released relating to other industries 13 MARSH

  15. Marsh’s Cyber Risk Management Framework Manage Assess Respond A thorough understanding of You can’t eliminate cyber - Prevent | Prepare | Transfer your risk profile is critical for attacks, but you can control how cyber risk management, and Cyber risk management requires a you handle them, and the that means more than just the balanced approach of: decisions you make after an typical compliance audit. You event make a big difference. Prevention — to stop cyber- need to inventory your cyber- When a threat, breach, or attack attacks from succeeding. vulnerable assets, identify new occurs, you need to detect it as Preparation — to make sure you and emerging threats, and soon as possible and react are ready when an event happens. model the potential impact of quickly. A quick, effective an event. And given the Risk Transfer — to transfer cyber response and clear dynamic and ever-evolving risk off your balance sheet. communication with internal and nature of the risk, you must external stakeholders is have the discipline to essential. continuously gauge changes in your risk profile – and adapt. Cyber Event 14 MARSH

  16. Understanding the Gaps in Coverage GENERAL LIABILITY D&O PROPERTY TYPES OF POLICIES ERRORS AND FIDELITY OMISSIONS AND CRIME 15 MARSH

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend