SlideShare a Scribd company logo
1 of 35
Discussing Cyber Risk Coverage 
With Your Commercial Clients 
Steve Robinson 
Area President 
RPS Technology & Cyber 
October 17, 2014
Threat Landscape 
and Common 
Misperceptions
Facts 
 When it comes to data breach, size 
doesn’t matter* 
 It’s more than just hacking 
 The “we’ve got this covered” attitude is 
waning 
 IT is now very much on board 
*Source: 2013 Data Breach Investigations Report 
Verizon RISK Team, et al
The Changing Threat Landscape 
“Our 2013 findings suggest that there’s a lot of 
complacency among organizations about the 
risk of espionage attacks. The assumption is 
that these attacks only target government, 
military and high-profile organizations, but our 
data shows that this increasingly isn’t true. 
Don’t underestimate the likelihood that your 
organization will be a target..” 
Source: 2013 Data Breach Investigations Report 
Verizon RISK Team, et al 
RPS Technology & Cyber
Information Risks – 
What Can Go Wrong?
Information Risks 
Hazards 
 Hacker Attacks/Unauthorized Access 
 Virus/Malicious Code 
 Denial of Services Attacks 
 Malicious Hardware 
 Physical Theft of Device/Media 
 Accidental Release 
 Employee/Vendor Error 
 Rogue Employees 
 Social Engineering
Information Risks 
Source: Open Security Foundation
Industry-Specific 
Threats
Industry-Specific Threats 
Healthcare Retail Education Hospitality Financial Public Entity Nonprofit Mfg Technology 
RPS Technology & Cyber 
Breach of Personally 
Identifiable Info (PII) 
Breach of credit card 
data & PCI Fines 
Breach of Protected 
Health Information 
(PHI) 
Breach of customers’ 
rights to privacy 
Breach of 
confidential 
employee data 
eBusiness 
Interruption 
Technology Errors or 
Omissions 
Personal Injury – 
Social Media 
Environment 
Intellectual Property 
Infringement 
Regulatory Liability 
Electronic Theft 
Cyber Extortion
Cost of a Data Breach
Data Breach Related Costs 
 Average cost per compromised record = $201.00* 
 Direct 
 Coordination 
 Defense 
 Notification expenses 
 Credit monitoring 
 Regulatory fines 
 Indirect 
 Customer churn 
 Impact on shareholder value 
 Loss of future opportunity 
Source: Ponemon Institute 2013 Annual Study “Cost of a Data Breach”
Related Costs 
Per Capita Cost By Industry Classification* 
Source: Ponemon Institute 2013 Annual Study “Cost of a Data Breach”
Mitigating Risk in our 
Clients’ Businesses
How Can Clients Reduce Their Risk? 
 Data Management* 
 Collection 
 What employee, customer, donor/volunteer (nonprofits) data are you storing? 
 Do you need to store it? 
 Access 
 Who in your organization has access to sensitive information? 
 Do those with access absolutely need access to perform their job? 
 What of this information is publically available? 
 Use 
 Are you using customer info in a manner it was originally intended (and consistent with the 
way you communicated to your customers?) 
 Storage 
 Where is your data stored? 
 Is the stored information protected by access controls? 
 Does sensitive customer information exist in multiple formats? 
 Eradication 
 How long do you keep customer information? 
 What do you do with info (in any format) you no longer need? 
 3rd party vendor agreements for document storage, 
disposal, janitorial services, etc. 
Source: NTEN – Nonprofit Technology Network
How Can Clients Reduce Their Risk? 
 Policies & Procedures 
 Privacy 
 Do you have a written privacy policy in place? 
 Have employees and/or volunteers been trained? 
 Social Media 
 Inventory your social media presence - regularly 
 Restrict authority for creation and content management on behalf of your organization to 
one or two designated employees 
 Are there restrictions for social media access on systems that connect to your network 
containing personal information on customers, employees, etc.? 
 Websites, Intellectual Property & Electronic Communication 
 Consistency of content and message? 
 Legal review? 
 Have appropriate rights been secured (music, lyrics, video, etc.) 
 Staff training in email etiquette 
 Network Security 
 Software, patch management, spam filters, firewall protection, etc. & Credentialing 
 Encryption of data - at rest and in a mobile state 
 Vulnerability testing 
 BYOD policies
How Can Clients Reduce Their Risk? 
 Risk Transfer 
 Vendor Agreements 
 Appropriate transfer of liability language in vendor contracts? 
 Cloud providers 
 Payment processors 
 Website hosting services 
 Document disposal, storage and janitorial services 
 Insurance 
 Cyber/Privacy Liability Insurance
Cyber Risk 
Insurance Coverage
What is Cyber Risk Insurance? 
 Insurance coverage designed to protect a business from: 
 Liability associated with: 
• Unauthorized release of confidential information 
• Violation of a person’s rights to privacy 
• Personal injury in an electronic/social media environment 
• Intellectual property infringement 
• Violations of state or federal privacy laws 
 Out-of-pocket expenses incurred to make the above problems go away
Cyber Risk Insurance 
RPS Technology & Cyber 
Exposure Category Description 
Privacy Liability Provides liability coverage for failure to protect electronic or non-electronic information in your 
care custody and control. Can include coverage for acts of vendors as well. 
Network Security Liability Provides liability coverage if an Insured's Computer System fails to prevent a Security 
Breach, becomes inaccessible to those who need it or unintentionally transmits a virus to a 
3rd party. 
Media Content Liability Provides liability coverage for Intellectual Property and Personal Injury lawsuits stemming 
from your website or social media content under your direct control. 
Regulatory Liability Defense coverage for legal proceedings or investigations by Federal, State, or Foreign 
regulators relating to Privacy Laws. 
Crisis Management 
Legal Assistance Expense Expenses incurred to hire an attorney to help navigate the breach response process in accordance 
with the multitude of State and federal laws. 
Forensic Expense Expenses incurred to hire a firm to conduct IT forensics investigations following a data breach. 
Notification Expense Expenses incurred to notify members of a breach in accordance with State and Federal laws. 
Credit Monitoring Expense Expenses incurred to provide donors with access to identity protection services. 
Public Relations Expense Expenses incurred to hire a public relations consultancy, media expenses, etc. in the wake of a data 
breach. 
Data Recovery/Restoration Expenses incurred to re-create data that is damaged as a result of a cyber incident. 
Business Interruption The reduction of business income as a result of an interruption or use of a computer system as a 
result of a network breach to their system. 
Cyber Extortion Expenses incurred resulting from threats to introduce a system hack, virus, etc. or from threats to 
disseminate or use information contained in your computer systems to destroy or alter your 
computer systems. 
Fines and Penalties Where permissible by law, expenses incurred as a result of a State, Federal or other (PCI DSS) fine or 
penalty resulting from a data breach.
Doesn’t My Insurance 
Already Cover This?
ISO General Liability Form 
Coverage exclusion for claims of copyright, 
trademark infringement.
ISO Property Form 
Protects physical computers 
but not the data that is stored on them.
CGL Data Breach Exclusions 
Current ISO CGL form 
coverage is provided: 
“For personal and advertising 
injury as the offense of an oral or 
written publication in any manner, 
or material that violates a person’s 
right of privacy.” 
New ISO GL Exclusion (effective 
May 2014): 
“Exclusion – Access or Disclosure of 
confidential or personal information 
and data-related liability – with limited 
bodily injury exception.”
Doesn’t My Insurance Cover This? 
General Liability Property Crime Professional K&R Cyber 
3rd Party Privacy/Network 
Security/Personal Injury/IP 
Theft/Unauthorized Disclosure PII 
Breach of Confidential Corporate Info 
Technology E&O 
Media Liability/Social Networking 
Regulatory Defense/Penalties 
Virus/Malicious Code Transmission 
1st Party Privacy / Network Risks 
Legal Assistance/Breach Coach 
IT Forensics 
Physical Damage to Data 
Denial of Service Attack 
Business Income from Security Event 
Extortion or Threat 
Rogue Employee - Data Related 
Public Relations/Crisis Management 
Coverage Provided? 
Coverage Possible? 
No Coverage? 
* For reference and discussion only; policy language and facts of claim will require further analysis. This is not a 
guarantee of coverage.
Cyber Risk Coverage: 
Key Differentiators 
RPS Technology & Cyber
Cyber Risk Coverage 
 Samples of Key Differentiators: 
 Look carefully at the definitions 
 Unauthorized acts of employees 
 Coverage for electronic and non-electronic information 
 Vicarious liability - 3rd parties/vendors/cloud providers 
 Defense of privacy regulatory actions (at full privacy limits) 
 Regulatory fines & penalties 
 Sublimits for 1st party vs full limits 
 Breadth of media coverage
Cyber Risk Coverage 
 Common Exclusions 
 Intentional Acts – look closely here 
 Infrastructure failure 
 Software Responsibility/Inadequate Software 
 Unencrypted portable media 
 Wrongful Collection 
 Employment Practices
Not All Policies Are Created Equal
Cyber Endorsement “Fail”
Application Process & 
Rating Factors
Application Process & Rating Factors 
 Pricing 
 Class of business 
• High/Medium/Low 
• Number of patients and records held – medical 
 Annual revenue 
 Number of employees 
 Network defense parameters in place and update procedures 
 Information security policies 
 Loss history 
 Application 
 New streamlined options available
Coverage Trends
Coverage Trends 
 The tale of two worlds 
 Large retail – appetite, capacity, underwriting 
 Small business 
 Business Interruption triggers 
 Aggregation 
 Reputational Harm 
 Electronic Theft – monetary & otherwise 
 Retro date
Summary 
 Why Your Client Needs Cyber Risk Coverage 
 Specific exclusions exist in traditional policies for: 
• Privacy breach 
• Network related incidents 
• eBusiness Interruption 
• Personal Injury in Social Media, websites, blogs, etc. 
• Regulatory defense, fines 
 Buying coverage aligns pre and post-breach resources not 
afforded under other policies 
 Claims are on the rise 
 Laws are driving demand: 
• GLB, HIPAA, HI-TECH Act, FTC’s Red Flag Rule, etc. 
• 47 of 50 States require notification 
 Coverage is more accessible and affordable than ever
Thank You 
Steven R. Robinson 
Area President 
Steven_Robinson@RPSins.com 
www.RPSins.com 
410-901-0704 direct 
800-336-5659 toll free

More Related Content

What's hot

Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationEric Reehl
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data SecurityImperva
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesIISPEastMids
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspacetimmcguinness
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Lawguest8b10a3
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...SafeNet
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Lawtravismd
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Dawn Yankeelov
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Fasoo
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)KP Naidu
 

What's hot (20)

Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and Preparation
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data Security
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspace
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Law
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 
Cyber liaility insurance the basics
Cyber liaility insurance   the basicsCyber liaility insurance   the basics
Cyber liaility insurance the basics
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
 
Data breach-response-planning-laying-the-right-foundation
Data breach-response-planning-laying-the-right-foundationData breach-response-planning-laying-the-right-foundation
Data breach-response-planning-laying-the-right-foundation
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
 
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)
 

Viewers also liked

Commercial Risk Europe p1 & p16
Commercial Risk Europe p1 & p16Commercial Risk Europe p1 & p16
Commercial Risk Europe p1 & p16David Benning
 
Credit Risk In Commercial Real Estate Structured Financing
Credit Risk In Commercial Real Estate Structured FinancingCredit Risk In Commercial Real Estate Structured Financing
Credit Risk In Commercial Real Estate Structured Financingvianney_debellut
 
Abna Cash Flow, Credit Risk & Commercial Collections
Abna Cash Flow, Credit Risk & Commercial CollectionsAbna Cash Flow, Credit Risk & Commercial Collections
Abna Cash Flow, Credit Risk & Commercial Collectionsjennstacey
 
Split range control system
Split range  control systemSplit range  control system
Split range control systemAshvani Shukla
 
Capgemini Commercial Insurance Risk Analytics Powered by HP HAVEn
Capgemini Commercial Insurance Risk Analytics Powered by HP HAVEnCapgemini Commercial Insurance Risk Analytics Powered by HP HAVEn
Capgemini Commercial Insurance Risk Analytics Powered by HP HAVEnCapgemini
 
Business Development & Commercialization Plan
Business Development & Commercialization PlanBusiness Development & Commercialization Plan
Business Development & Commercialization PlanPriyesh Waghmare
 
Introduction to Internet of things
Introduction to Internet of thingsIntroduction to Internet of things
Introduction to Internet of thingsRehmat Ullah
 
CHC Safety & Quality Summit 2016 - Risk Culture in Commercial Air Transport
CHC Safety & Quality Summit 2016 - Risk Culture in Commercial Air TransportCHC Safety & Quality Summit 2016 - Risk Culture in Commercial Air Transport
CHC Safety & Quality Summit 2016 - Risk Culture in Commercial Air TransportCranfield University
 
Internet of Things- An Introduction
Internet of Things- An IntroductionInternet of Things- An Introduction
Internet of Things- An IntroductionRavindra Dastikop
 
What Exactly Is The "Internet of Things"?
What Exactly Is The "Internet of Things"?What Exactly Is The "Internet of Things"?
What Exactly Is The "Internet of Things"?Postscapes
 
5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things) 5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things) Deloitte United States
 

Viewers also liked (14)

Commercial Risk Europe p1 & p16
Commercial Risk Europe p1 & p16Commercial Risk Europe p1 & p16
Commercial Risk Europe p1 & p16
 
Measuring usability
Measuring usabilityMeasuring usability
Measuring usability
 
Credit Risk In Commercial Real Estate Structured Financing
Credit Risk In Commercial Real Estate Structured FinancingCredit Risk In Commercial Real Estate Structured Financing
Credit Risk In Commercial Real Estate Structured Financing
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Abna Cash Flow, Credit Risk & Commercial Collections
Abna Cash Flow, Credit Risk & Commercial CollectionsAbna Cash Flow, Credit Risk & Commercial Collections
Abna Cash Flow, Credit Risk & Commercial Collections
 
Financial Instruments for Energy Markets
Financial Instruments for Energy MarketsFinancial Instruments for Energy Markets
Financial Instruments for Energy Markets
 
Split range control system
Split range  control systemSplit range  control system
Split range control system
 
Capgemini Commercial Insurance Risk Analytics Powered by HP HAVEn
Capgemini Commercial Insurance Risk Analytics Powered by HP HAVEnCapgemini Commercial Insurance Risk Analytics Powered by HP HAVEn
Capgemini Commercial Insurance Risk Analytics Powered by HP HAVEn
 
Business Development & Commercialization Plan
Business Development & Commercialization PlanBusiness Development & Commercialization Plan
Business Development & Commercialization Plan
 
Introduction to Internet of things
Introduction to Internet of thingsIntroduction to Internet of things
Introduction to Internet of things
 
CHC Safety & Quality Summit 2016 - Risk Culture in Commercial Air Transport
CHC Safety & Quality Summit 2016 - Risk Culture in Commercial Air TransportCHC Safety & Quality Summit 2016 - Risk Culture in Commercial Air Transport
CHC Safety & Quality Summit 2016 - Risk Culture in Commercial Air Transport
 
Internet of Things- An Introduction
Internet of Things- An IntroductionInternet of Things- An Introduction
Internet of Things- An Introduction
 
What Exactly Is The "Internet of Things"?
What Exactly Is The "Internet of Things"?What Exactly Is The "Internet of Things"?
What Exactly Is The "Internet of Things"?
 
5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things) 5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things)
 

Similar to Discussing Cyber Risk Coverage With Commercial Clients

Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftCBIZ, Inc.
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)stevemeltzer
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Michael C. Keeling, Esq.
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...cyberprosocial
 
Legal challenges for big data companies
Legal challenges for big data companiesLegal challenges for big data companies
Legal challenges for big data companiesRoger Royse
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksThis account is closed
 
The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1stevemeltzer
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustGrant Thornton LLP
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 

Similar to Discussing Cyber Risk Coverage With Commercial Clients (20)

Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Cyber security
Cyber securityCyber security
Cyber security
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Legal challenges for big data companies
Legal challenges for big data companiesLegal challenges for big data companies
Legal challenges for big data companies
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 

More from Don Grauel

Surety Industry Overview: State of the Industry by Cissie Scoggin
Surety Industry Overview: State of the Industry by Cissie ScogginSurety Industry Overview: State of the Industry by Cissie Scoggin
Surety Industry Overview: State of the Industry by Cissie ScogginDon Grauel
 
Unti-Claims Handling Following Catastrophes 2013-10
Unti-Claims Handling Following Catastrophes 2013-10Unti-Claims Handling Following Catastrophes 2013-10
Unti-Claims Handling Following Catastrophes 2013-10Don Grauel
 
Ryan-Special Events Insurance Considerations 2013-10
Ryan-Special Events Insurance Considerations 2013-10Ryan-Special Events Insurance Considerations 2013-10
Ryan-Special Events Insurance Considerations 2013-10Don Grauel
 
Petit-Workers Compensation—Medicare Secondary Payer Issues 2013-10
Petit-Workers Compensation—Medicare Secondary Payer Issues 2013-10Petit-Workers Compensation—Medicare Secondary Payer Issues 2013-10
Petit-Workers Compensation—Medicare Secondary Payer Issues 2013-10Don Grauel
 
Donald-Climate Change, Uncovering Risk in a Warming World 2013-10
Donald-Climate Change, Uncovering Risk in a Warming World 2013-10Donald-Climate Change, Uncovering Risk in a Warming World 2013-10
Donald-Climate Change, Uncovering Risk in a Warming World 2013-10Don Grauel
 
Lininger-Property & Casualty Legislative Up-date 2013-10
Lininger-Property & Casualty Legislative Up-date 2013-10Lininger-Property & Casualty Legislative Up-date 2013-10
Lininger-Property & Casualty Legislative Up-date 2013-10Don Grauel
 
Waite- Flood IRT Balto 10_2012
Waite- Flood IRT Balto 10_2012Waite- Flood IRT Balto 10_2012
Waite- Flood IRT Balto 10_2012Don Grauel
 
Shields- Equity View IRT Balto 10_2012
Shields- Equity View IRT Balto 10_2012Shields- Equity View IRT Balto 10_2012
Shields- Equity View IRT Balto 10_2012Don Grauel
 
LaCroix- D&O IRT Balto 10-2012
LaCroix- D&O IRT Balto 10-2012LaCroix- D&O IRT Balto 10-2012
LaCroix- D&O IRT Balto 10-2012Don Grauel
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Hal White 2010 Fowler Seminar
Hal White 2010 Fowler SeminarHal White 2010 Fowler Seminar
Hal White 2010 Fowler SeminarDon Grauel
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Dan Hausmann 2010 Fowler Seminar
Dan Hausmann 2010 Fowler SeminarDan Hausmann 2010 Fowler Seminar
Dan Hausmann 2010 Fowler SeminarDon Grauel
 
Sabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler SeminarSabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler SeminarDon Grauel
 
Ron Adams 2010 Fowler Seminar
Ron Adams 2010 Fowler SeminarRon Adams 2010 Fowler Seminar
Ron Adams 2010 Fowler SeminarDon Grauel
 

More from Don Grauel (15)

Surety Industry Overview: State of the Industry by Cissie Scoggin
Surety Industry Overview: State of the Industry by Cissie ScogginSurety Industry Overview: State of the Industry by Cissie Scoggin
Surety Industry Overview: State of the Industry by Cissie Scoggin
 
Unti-Claims Handling Following Catastrophes 2013-10
Unti-Claims Handling Following Catastrophes 2013-10Unti-Claims Handling Following Catastrophes 2013-10
Unti-Claims Handling Following Catastrophes 2013-10
 
Ryan-Special Events Insurance Considerations 2013-10
Ryan-Special Events Insurance Considerations 2013-10Ryan-Special Events Insurance Considerations 2013-10
Ryan-Special Events Insurance Considerations 2013-10
 
Petit-Workers Compensation—Medicare Secondary Payer Issues 2013-10
Petit-Workers Compensation—Medicare Secondary Payer Issues 2013-10Petit-Workers Compensation—Medicare Secondary Payer Issues 2013-10
Petit-Workers Compensation—Medicare Secondary Payer Issues 2013-10
 
Donald-Climate Change, Uncovering Risk in a Warming World 2013-10
Donald-Climate Change, Uncovering Risk in a Warming World 2013-10Donald-Climate Change, Uncovering Risk in a Warming World 2013-10
Donald-Climate Change, Uncovering Risk in a Warming World 2013-10
 
Lininger-Property & Casualty Legislative Up-date 2013-10
Lininger-Property & Casualty Legislative Up-date 2013-10Lininger-Property & Casualty Legislative Up-date 2013-10
Lininger-Property & Casualty Legislative Up-date 2013-10
 
Waite- Flood IRT Balto 10_2012
Waite- Flood IRT Balto 10_2012Waite- Flood IRT Balto 10_2012
Waite- Flood IRT Balto 10_2012
 
Shields- Equity View IRT Balto 10_2012
Shields- Equity View IRT Balto 10_2012Shields- Equity View IRT Balto 10_2012
Shields- Equity View IRT Balto 10_2012
 
LaCroix- D&O IRT Balto 10-2012
LaCroix- D&O IRT Balto 10-2012LaCroix- D&O IRT Balto 10-2012
LaCroix- D&O IRT Balto 10-2012
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Hal White 2010 Fowler Seminar
Hal White 2010 Fowler SeminarHal White 2010 Fowler Seminar
Hal White 2010 Fowler Seminar
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Dan Hausmann 2010 Fowler Seminar
Dan Hausmann 2010 Fowler SeminarDan Hausmann 2010 Fowler Seminar
Dan Hausmann 2010 Fowler Seminar
 
Sabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler SeminarSabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler Seminar
 
Ron Adams 2010 Fowler Seminar
Ron Adams 2010 Fowler SeminarRon Adams 2010 Fowler Seminar
Ron Adams 2010 Fowler Seminar
 

Recently uploaded

Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 

Recently uploaded (20)

Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 

Discussing Cyber Risk Coverage With Commercial Clients

  • 1. Discussing Cyber Risk Coverage With Your Commercial Clients Steve Robinson Area President RPS Technology & Cyber October 17, 2014
  • 2. Threat Landscape and Common Misperceptions
  • 3. Facts  When it comes to data breach, size doesn’t matter*  It’s more than just hacking  The “we’ve got this covered” attitude is waning  IT is now very much on board *Source: 2013 Data Breach Investigations Report Verizon RISK Team, et al
  • 4. The Changing Threat Landscape “Our 2013 findings suggest that there’s a lot of complacency among organizations about the risk of espionage attacks. The assumption is that these attacks only target government, military and high-profile organizations, but our data shows that this increasingly isn’t true. Don’t underestimate the likelihood that your organization will be a target..” Source: 2013 Data Breach Investigations Report Verizon RISK Team, et al RPS Technology & Cyber
  • 5. Information Risks – What Can Go Wrong?
  • 6. Information Risks Hazards  Hacker Attacks/Unauthorized Access  Virus/Malicious Code  Denial of Services Attacks  Malicious Hardware  Physical Theft of Device/Media  Accidental Release  Employee/Vendor Error  Rogue Employees  Social Engineering
  • 7. Information Risks Source: Open Security Foundation
  • 9. Industry-Specific Threats Healthcare Retail Education Hospitality Financial Public Entity Nonprofit Mfg Technology RPS Technology & Cyber Breach of Personally Identifiable Info (PII) Breach of credit card data & PCI Fines Breach of Protected Health Information (PHI) Breach of customers’ rights to privacy Breach of confidential employee data eBusiness Interruption Technology Errors or Omissions Personal Injury – Social Media Environment Intellectual Property Infringement Regulatory Liability Electronic Theft Cyber Extortion
  • 10. Cost of a Data Breach
  • 11. Data Breach Related Costs  Average cost per compromised record = $201.00*  Direct  Coordination  Defense  Notification expenses  Credit monitoring  Regulatory fines  Indirect  Customer churn  Impact on shareholder value  Loss of future opportunity Source: Ponemon Institute 2013 Annual Study “Cost of a Data Breach”
  • 12. Related Costs Per Capita Cost By Industry Classification* Source: Ponemon Institute 2013 Annual Study “Cost of a Data Breach”
  • 13. Mitigating Risk in our Clients’ Businesses
  • 14. How Can Clients Reduce Their Risk?  Data Management*  Collection  What employee, customer, donor/volunteer (nonprofits) data are you storing?  Do you need to store it?  Access  Who in your organization has access to sensitive information?  Do those with access absolutely need access to perform their job?  What of this information is publically available?  Use  Are you using customer info in a manner it was originally intended (and consistent with the way you communicated to your customers?)  Storage  Where is your data stored?  Is the stored information protected by access controls?  Does sensitive customer information exist in multiple formats?  Eradication  How long do you keep customer information?  What do you do with info (in any format) you no longer need?  3rd party vendor agreements for document storage, disposal, janitorial services, etc. Source: NTEN – Nonprofit Technology Network
  • 15. How Can Clients Reduce Their Risk?  Policies & Procedures  Privacy  Do you have a written privacy policy in place?  Have employees and/or volunteers been trained?  Social Media  Inventory your social media presence - regularly  Restrict authority for creation and content management on behalf of your organization to one or two designated employees  Are there restrictions for social media access on systems that connect to your network containing personal information on customers, employees, etc.?  Websites, Intellectual Property & Electronic Communication  Consistency of content and message?  Legal review?  Have appropriate rights been secured (music, lyrics, video, etc.)  Staff training in email etiquette  Network Security  Software, patch management, spam filters, firewall protection, etc. & Credentialing  Encryption of data - at rest and in a mobile state  Vulnerability testing  BYOD policies
  • 16. How Can Clients Reduce Their Risk?  Risk Transfer  Vendor Agreements  Appropriate transfer of liability language in vendor contracts?  Cloud providers  Payment processors  Website hosting services  Document disposal, storage and janitorial services  Insurance  Cyber/Privacy Liability Insurance
  • 18. What is Cyber Risk Insurance?  Insurance coverage designed to protect a business from:  Liability associated with: • Unauthorized release of confidential information • Violation of a person’s rights to privacy • Personal injury in an electronic/social media environment • Intellectual property infringement • Violations of state or federal privacy laws  Out-of-pocket expenses incurred to make the above problems go away
  • 19. Cyber Risk Insurance RPS Technology & Cyber Exposure Category Description Privacy Liability Provides liability coverage for failure to protect electronic or non-electronic information in your care custody and control. Can include coverage for acts of vendors as well. Network Security Liability Provides liability coverage if an Insured's Computer System fails to prevent a Security Breach, becomes inaccessible to those who need it or unintentionally transmits a virus to a 3rd party. Media Content Liability Provides liability coverage for Intellectual Property and Personal Injury lawsuits stemming from your website or social media content under your direct control. Regulatory Liability Defense coverage for legal proceedings or investigations by Federal, State, or Foreign regulators relating to Privacy Laws. Crisis Management Legal Assistance Expense Expenses incurred to hire an attorney to help navigate the breach response process in accordance with the multitude of State and federal laws. Forensic Expense Expenses incurred to hire a firm to conduct IT forensics investigations following a data breach. Notification Expense Expenses incurred to notify members of a breach in accordance with State and Federal laws. Credit Monitoring Expense Expenses incurred to provide donors with access to identity protection services. Public Relations Expense Expenses incurred to hire a public relations consultancy, media expenses, etc. in the wake of a data breach. Data Recovery/Restoration Expenses incurred to re-create data that is damaged as a result of a cyber incident. Business Interruption The reduction of business income as a result of an interruption or use of a computer system as a result of a network breach to their system. Cyber Extortion Expenses incurred resulting from threats to introduce a system hack, virus, etc. or from threats to disseminate or use information contained in your computer systems to destroy or alter your computer systems. Fines and Penalties Where permissible by law, expenses incurred as a result of a State, Federal or other (PCI DSS) fine or penalty resulting from a data breach.
  • 20. Doesn’t My Insurance Already Cover This?
  • 21. ISO General Liability Form Coverage exclusion for claims of copyright, trademark infringement.
  • 22. ISO Property Form Protects physical computers but not the data that is stored on them.
  • 23. CGL Data Breach Exclusions Current ISO CGL form coverage is provided: “For personal and advertising injury as the offense of an oral or written publication in any manner, or material that violates a person’s right of privacy.” New ISO GL Exclusion (effective May 2014): “Exclusion – Access or Disclosure of confidential or personal information and data-related liability – with limited bodily injury exception.”
  • 24. Doesn’t My Insurance Cover This? General Liability Property Crime Professional K&R Cyber 3rd Party Privacy/Network Security/Personal Injury/IP Theft/Unauthorized Disclosure PII Breach of Confidential Corporate Info Technology E&O Media Liability/Social Networking Regulatory Defense/Penalties Virus/Malicious Code Transmission 1st Party Privacy / Network Risks Legal Assistance/Breach Coach IT Forensics Physical Damage to Data Denial of Service Attack Business Income from Security Event Extortion or Threat Rogue Employee - Data Related Public Relations/Crisis Management Coverage Provided? Coverage Possible? No Coverage? * For reference and discussion only; policy language and facts of claim will require further analysis. This is not a guarantee of coverage.
  • 25. Cyber Risk Coverage: Key Differentiators RPS Technology & Cyber
  • 26. Cyber Risk Coverage  Samples of Key Differentiators:  Look carefully at the definitions  Unauthorized acts of employees  Coverage for electronic and non-electronic information  Vicarious liability - 3rd parties/vendors/cloud providers  Defense of privacy regulatory actions (at full privacy limits)  Regulatory fines & penalties  Sublimits for 1st party vs full limits  Breadth of media coverage
  • 27. Cyber Risk Coverage  Common Exclusions  Intentional Acts – look closely here  Infrastructure failure  Software Responsibility/Inadequate Software  Unencrypted portable media  Wrongful Collection  Employment Practices
  • 28. Not All Policies Are Created Equal
  • 30. Application Process & Rating Factors
  • 31. Application Process & Rating Factors  Pricing  Class of business • High/Medium/Low • Number of patients and records held – medical  Annual revenue  Number of employees  Network defense parameters in place and update procedures  Information security policies  Loss history  Application  New streamlined options available
  • 33. Coverage Trends  The tale of two worlds  Large retail – appetite, capacity, underwriting  Small business  Business Interruption triggers  Aggregation  Reputational Harm  Electronic Theft – monetary & otherwise  Retro date
  • 34. Summary  Why Your Client Needs Cyber Risk Coverage  Specific exclusions exist in traditional policies for: • Privacy breach • Network related incidents • eBusiness Interruption • Personal Injury in Social Media, websites, blogs, etc. • Regulatory defense, fines  Buying coverage aligns pre and post-breach resources not afforded under other policies  Claims are on the rise  Laws are driving demand: • GLB, HIPAA, HI-TECH Act, FTC’s Red Flag Rule, etc. • 47 of 50 States require notification  Coverage is more accessible and affordable than ever
  • 35. Thank You Steven R. Robinson Area President Steven_Robinson@RPSins.com www.RPSins.com 410-901-0704 direct 800-336-5659 toll free