SlideShare a Scribd company logo
1 of 29
Download to read offline
1
Cyber Risks Management
Nikos Georgopoulos, MBA, cyRM
Cyber Risks Advisor
Contents
• Corporate Assets
• Data Breach Costs
• Time from Earliest Evidence of Compromise to Discovery of Compromise
• The Data Protection Landscape - GDPR
• Cyber Risks Management
• Prevention
• A Simplified Overview of a Data Breach
• Cyber Insurance Covers at a glance
• How do insurers rate cyber risk?
• What are insurers looking for in terms of cyber risk management
• Cyber Secure Solution
• Beazley Global Breach Solution
• www.cyberinsurancequote.gr
• Cyber Risks Advisors LinkedIn Group
• Appendices
• Historical Development of Cyber (Re)Insurance
• Insurance Covers at a Glance
• www.privacyrisksadvisors.com
• www.cyberinsurancegreece.com
• More Information
2
Corporate Assets
3
The Average per Capita Cost of Data Breach per Industry
4
2014 – Cost of Data Breach Study global – Ponemon Institute Research Report
5
Πηγή: Μ Trends 2015 A View from the Front Lines
Time from Earliest Evidence of Compromise to Discovery
of Compromise
6
The Data Protection Landscape - GDPR
General Data Protection Regulation
• Fines - of up to EUR 20m or 4% of annual global turnover for breaches
of the rules
• Breach notification:
– Regulator - “without undue delay” and where feasible within 72 hours.
– Affected Individuals – only where breaches likely to pose a high risk.
• Data Protection Officers
• Telecommunications, ISP’s, Financial Sector, Energy, Transport,
Health.
Cyber Security Incident
7
Prevention
• Security awareness/education
• Risk assessment
• Policies and procedures
• Vendor management
• Incident Response Plan
• Data Recovery Plan
• Business Continuity Plan
• Cyber Insurance
8
9
A Simplified Overview of a Data Breach
Cyber Insurance Covers
10
Cyber Insurance (Network security and privacy)
GAP analysis
11
Claims Payouts by Type of Cost
12
NetDiligence Report 2015 – Cyber Liability and Data Breach Insurance Claims
Claims by Cause of Loss
13
NetDiligence Report 2015 – Cyber Liability and Data Breach Insurance Claims
Claims Allocation by Business Sector
14
NetDiligence Report 2015 – Cyber Liability and Data Breach Insurance Claims
How do insurers rate cyber risk?
• Industry / turnover
• Data – amount and type
• Reliance on IT network for operations
• IT Security, Policies and Procedures
• Compliance with regulations (Data Protection Act, Industry PCI, etc)
• Employee training
• Firewalls, Encryption..
• Access controls
• Readiness to deal with an incident
• Cyber risk culture – internally and externally
• Claims experience
15
What are insurers looking for in terms of cyber
risk management
• IT Security
• Encryption, Industry Standards, Access Management, Patch Management
• Are you ready for a breach?
• Having a tested response plan in place which details how you will respond to a
breach can make your response more efficient and effective
• Are you considering and managing cyber risks at an
organisational level?
• It is a myth that cyber risks are only the responsibility of the IT department
• Have you considered the Human Element?
• The Verizon, 2015 Data Breach Investigations Report, which collected information
on 100,000+ incidents over the last 10 years, shows that 50% of breaches within
organisations in 2014 were caused by human error
• Supply chain management
• Auditing and restriction of access
16
17
18
Beazley Global Breach Solution
• An insurance solution with comprehensive mitigation services for
privacy and security risks.
• 3.500+ breaches managed
• 80% of claims spend on service and managing breaches.
• Advisen Award 2015: Beazley Breach Response Team
19
www.cyberinsurancequote.gr
20
What Every CISO Needs to Know About Cyber Insurance
21
22
Cyber Risks Advisors
Appendices
23
Historical Development of Cyber (Re)Insurance
24
Insurance Covers at a Glance
First-party coverage include:
• Theft and fraud. Covers destruction or loss of the policyholder's data as the result of a
criminal or fraudulent cyber event.
• Forensic investigation. Covers the legal, technical or forensic services necessary to
assess whether a cyber attack has occurred, to assess the impact of the attack and to
stop an attack.
• Business interruption. Covers lost income and related costs where a policyholder is
unable to conduct business due to a cyber event or data loss.
• Extortion. Provides coverage for the costs associated with the investigation of threats
to commit cyber attacks against the policyholder's systems and for payments to
extortionists who threaten to obtain and disclose sensitive information.
• Computer data loss and restoration. Covers physical damage to, or loss of use of,
computer-related assets, including the costs of retrieving and restoring data, hardware,
software or other information destroyed or damaged as the result of a cyber attack.
25
Insurance Covers at a Glance
Third-party coverage include:
• Litigation and regulatory. Covers the costs associated with civil lawsuits, judgments,
settlements or penalties resulting from a cyber event.
• Regulatory response. Covers the legal, technical or forensic services necessary to assist
the policyholder in responding to governmental inquiries relating to a cyber attack, and
provides coverage for fines, penalties, investigations or other regulatory actions.
• Notification costs. Covers the costs to notify customers, employees or other victims
affected by a cyber event, including notice required by law.
• Crisis management. Covers crisis management and public relations expenses incurred
to educate customers concerning a cyber event and the policyholder's response,
including the cost of advertising for this purpose.
• Media liability. Provides coverage for media liability, including coverage for copyright,
trademark or service mark infringement resulting from online publication by the insured.
26
27
www.privacyrisksadvisors.com
28
www.cyberinsurancegreece.com
More Information
29
CROMAR Insurance Brokers LTD, LLOYD's Coverholder
Athens, Ag. Konstantinou 17 & Ag. Anargiron - 151 24 Marousi Τ: +30 210 80 28 946-7, F: +30 210 80 29 055
Thessaloniki, Politechniou 24 – 546 25, T: +30 2310 50 2506, F: +30 2310 52 6028
http://www.cromar.gr
Nikos Georgopoulos
Cyber Risks Advisor
TEL. 6948 365033
Email: nikos.georgopoulos@cromar.gr

More Related Content

What's hot

Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber securityIT Governance Ltd
 
How to Protect your Business with Cyber Security
How to Protect your Business with Cyber SecurityHow to Protect your Business with Cyber Security
How to Protect your Business with Cyber SecurityBizSmart Select
 
The developing world of cyber litigation and compliance
The developing world of cyber litigation and complianceThe developing world of cyber litigation and compliance
The developing world of cyber litigation and compliancePECB
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksThis account is closed
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...IT Governance Ltd
 
Are you preparing for GDPR?
Are you preparing for GDPR?Are you preparing for GDPR?
Are you preparing for GDPR?Chris Bullock
 
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesKroll
 
ISDC_2015_Philippe Aerni_Cyber Versicherung
ISDC_2015_Philippe Aerni_Cyber VersicherungISDC_2015_Philippe Aerni_Cyber Versicherung
ISDC_2015_Philippe Aerni_Cyber VersicherungIBM Switzerland
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...IT Governance Ltd
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPRHow an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPRPECB
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017isc2-hellenic
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...ARMA International
 
GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality Susan Moran
 
Six Degrees: Securing your business data - Nov 29 2018
Six Degrees: Securing your business data - Nov 29 2018Six Degrees: Securing your business data - Nov 29 2018
Six Degrees: Securing your business data - Nov 29 2018Six Degrees
 

What's hot (20)

Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber security
 
How to Protect your Business with Cyber Security
How to Protect your Business with Cyber SecurityHow to Protect your Business with Cyber Security
How to Protect your Business with Cyber Security
 
The developing world of cyber litigation and compliance
The developing world of cyber litigation and complianceThe developing world of cyber litigation and compliance
The developing world of cyber litigation and compliance
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
 
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
 
Are you preparing for GDPR?
Are you preparing for GDPR?Are you preparing for GDPR?
Are you preparing for GDPR?
 
A Guide to Disaster Preparedness for Businesses
A Guide to Disaster Preparedness for BusinessesA Guide to Disaster Preparedness for Businesses
A Guide to Disaster Preparedness for Businesses
 
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
 
ISDC_2015_Philippe Aerni_Cyber Versicherung
ISDC_2015_Philippe Aerni_Cyber VersicherungISDC_2015_Philippe Aerni_Cyber Versicherung
ISDC_2015_Philippe Aerni_Cyber Versicherung
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
3GRC approach to GDPR V 0.1 www.3grc.co.uk
3GRC  approach to GDPR V 0.1 www.3grc.co.uk3GRC  approach to GDPR V 0.1 www.3grc.co.uk
3GRC approach to GDPR V 0.1 www.3grc.co.uk
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPRHow an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
 
GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality
 
Six Degrees: Securing your business data - Nov 29 2018
Six Degrees: Securing your business data - Nov 29 2018Six Degrees: Securing your business data - Nov 29 2018
Six Degrees: Securing your business data - Nov 29 2018
 

Similar to Infocom security 2016 - Cromar Presentation

protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...James Fisher
 
Construction Cyber Risks
Construction Cyber RisksConstruction Cyber Risks
Construction Cyber RisksGraeme Cross
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftCBIZ, Inc.
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Michael C. Keeling, Esq.
 
Cyber Risk and Marine Insurance
Cyber Risk and Marine InsuranceCyber Risk and Marine Insurance
Cyber Risk and Marine InsurancePeter Hulyer
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitKevin Duffey
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
 
Cyberinsurance 111006
Cyberinsurance 111006Cyberinsurance 111006
Cyberinsurance 111006JNicholson
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
Training Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfTraining Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfdotco
 
How to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRHow to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRCharlie Pownall
 
Aon Cyber Risk Solutions
Aon Cyber Risk SolutionsAon Cyber Risk Solutions
Aon Cyber Risk SolutionsGraeme Cross
 
EU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentationEU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentationFERMA
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesDimitri Sirota
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsSarah Cirelli
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 

Similar to Infocom security 2016 - Cromar Presentation (20)

protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Cyber
Cyber Cyber
Cyber
 
Construction Cyber Risks
Construction Cyber RisksConstruction Cyber Risks
Construction Cyber Risks
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
Cyber Risk and Marine Insurance
Cyber Risk and Marine InsuranceCyber Risk and Marine Insurance
Cyber Risk and Marine Insurance
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
Cyberinsurance 111006
Cyberinsurance 111006Cyberinsurance 111006
Cyberinsurance 111006
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Training Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfTraining Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdf
 
How to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRHow to handle data breach incidents under GDPR
How to handle data breach incidents under GDPR
 
Aon Cyber Risk Solutions
Aon Cyber Risk SolutionsAon Cyber Risk Solutions
Aon Cyber Risk Solutions
 
EU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentationEU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentation
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 

More from Ethos Media S.A.

Annual stat report_2017_gr
Annual stat report_2017_grAnnual stat report_2017_gr
Annual stat report_2017_grEthos Media S.A.
 
350560 2018 214799 - egkyklios eaee
350560 2018   214799 - egkyklios eaee350560 2018   214799 - egkyklios eaee
350560 2018 214799 - egkyklios eaeeEthos Media S.A.
 
Zimies akrea-kerika-fenomena-27-30-septemvriou-2018
Zimies akrea-kerika-fenomena-27-30-septemvriou-2018Zimies akrea-kerika-fenomena-27-30-septemvriou-2018
Zimies akrea-kerika-fenomena-27-30-septemvriou-2018Ethos Media S.A.
 
Oikmel premium9months2018gr
Oikmel premium9months2018grOikmel premium9months2018gr
Oikmel premium9months2018grEthos Media S.A.
 
Oikmel premium8months2018gr
Oikmel premium8months2018grOikmel premium8months2018gr
Oikmel premium8months2018grEthos Media S.A.
 
Oikmel premium7months2018gr
Oikmel premium7months2018grOikmel premium7months2018gr
Oikmel premium7months2018grEthos Media S.A.
 
Zimies pyrkagies-attiki-eaee-ioulios-2018
Zimies pyrkagies-attiki-eaee-ioulios-2018Zimies pyrkagies-attiki-eaee-ioulios-2018
Zimies pyrkagies-attiki-eaee-ioulios-2018Ethos Media S.A.
 
Oikmel legalexpenses2017gr
Oikmel legalexpenses2017grOikmel legalexpenses2017gr
Oikmel legalexpenses2017grEthos Media S.A.
 
Oikmel crewinsurance2017gr
Oikmel crewinsurance2017grOikmel crewinsurance2017gr
Oikmel crewinsurance2017grEthos Media S.A.
 
Oikmel premium6months2018gr
Oikmel premium6months2018grOikmel premium6months2018gr
Oikmel premium6months2018grEthos Media S.A.
 
Oikmel premium5months2018gr
Oikmel premium5months2018grOikmel premium5months2018gr
Oikmel premium5months2018grEthos Media S.A.
 
Outlook 2018 update 5.07.18
Outlook 2018 update 5.07.18Outlook 2018 update 5.07.18
Outlook 2018 update 5.07.18Ethos Media S.A.
 
Dt.29.05 07-2018 ploia kai anwtates times kulikeiwn
Dt.29.05 07-2018 ploia kai anwtates times kulikeiwnDt.29.05 07-2018 ploia kai anwtates times kulikeiwn
Dt.29.05 07-2018 ploia kai anwtates times kulikeiwnEthos Media S.A.
 

More from Ethos Media S.A. (20)

Annual stat report_2017_gr
Annual stat report_2017_grAnnual stat report_2017_gr
Annual stat report_2017_gr
 
Oikmel companies2017gr
Oikmel companies2017grOikmel companies2017gr
Oikmel companies2017gr
 
350560 2018 214799 - egkyklios eaee
350560 2018   214799 - egkyklios eaee350560 2018   214799 - egkyklios eaee
350560 2018 214799 - egkyklios eaee
 
Zimies akrea-kerika-fenomena-27-30-septemvriou-2018
Zimies akrea-kerika-fenomena-27-30-septemvriou-2018Zimies akrea-kerika-fenomena-27-30-septemvriou-2018
Zimies akrea-kerika-fenomena-27-30-septemvriou-2018
 
Review life q1_q2_2018
Review life q1_q2_2018Review life q1_q2_2018
Review life q1_q2_2018
 
Csr 2016 2017
Csr 2016 2017Csr 2016 2017
Csr 2016 2017
 
Oikmel premium9months2018gr
Oikmel premium9months2018grOikmel premium9months2018gr
Oikmel premium9months2018gr
 
Oikmel premium8months2018gr
Oikmel premium8months2018grOikmel premium8months2018gr
Oikmel premium8months2018gr
 
Oikmel yacht2017gr
Oikmel yacht2017grOikmel yacht2017gr
Oikmel yacht2017gr
 
Oikmel property2017gr
Oikmel property2017grOikmel property2017gr
Oikmel property2017gr
 
Oikmel premium7months2018gr
Oikmel premium7months2018grOikmel premium7months2018gr
Oikmel premium7months2018gr
 
Zimies pyrkagies-attiki-eaee-ioulios-2018
Zimies pyrkagies-attiki-eaee-ioulios-2018Zimies pyrkagies-attiki-eaee-ioulios-2018
Zimies pyrkagies-attiki-eaee-ioulios-2018
 
Oikmel legalexpenses2017gr
Oikmel legalexpenses2017grOikmel legalexpenses2017gr
Oikmel legalexpenses2017gr
 
Manpower q4 2018_a4
Manpower q4 2018_a4Manpower q4 2018_a4
Manpower q4 2018_a4
 
Oikmel crewinsurance2017gr
Oikmel crewinsurance2017grOikmel crewinsurance2017gr
Oikmel crewinsurance2017gr
 
Oikmel premium6months2018gr
Oikmel premium6months2018grOikmel premium6months2018gr
Oikmel premium6months2018gr
 
Oikmel life2017gr
Oikmel life2017grOikmel life2017gr
Oikmel life2017gr
 
Oikmel premium5months2018gr
Oikmel premium5months2018grOikmel premium5months2018gr
Oikmel premium5months2018gr
 
Outlook 2018 update 5.07.18
Outlook 2018 update 5.07.18Outlook 2018 update 5.07.18
Outlook 2018 update 5.07.18
 
Dt.29.05 07-2018 ploia kai anwtates times kulikeiwn
Dt.29.05 07-2018 ploia kai anwtates times kulikeiwnDt.29.05 07-2018 ploia kai anwtates times kulikeiwn
Dt.29.05 07-2018 ploia kai anwtates times kulikeiwn
 

Recently uploaded

Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)Basil Achie
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptxBasil Achie
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 

Recently uploaded (20)

Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 

Infocom security 2016 - Cromar Presentation

  • 1. 1 Cyber Risks Management Nikos Georgopoulos, MBA, cyRM Cyber Risks Advisor
  • 2. Contents • Corporate Assets • Data Breach Costs • Time from Earliest Evidence of Compromise to Discovery of Compromise • The Data Protection Landscape - GDPR • Cyber Risks Management • Prevention • A Simplified Overview of a Data Breach • Cyber Insurance Covers at a glance • How do insurers rate cyber risk? • What are insurers looking for in terms of cyber risk management • Cyber Secure Solution • Beazley Global Breach Solution • www.cyberinsurancequote.gr • Cyber Risks Advisors LinkedIn Group • Appendices • Historical Development of Cyber (Re)Insurance • Insurance Covers at a Glance • www.privacyrisksadvisors.com • www.cyberinsurancegreece.com • More Information 2
  • 4. The Average per Capita Cost of Data Breach per Industry 4 2014 – Cost of Data Breach Study global – Ponemon Institute Research Report
  • 5. 5 Πηγή: Μ Trends 2015 A View from the Front Lines Time from Earliest Evidence of Compromise to Discovery of Compromise
  • 6. 6 The Data Protection Landscape - GDPR General Data Protection Regulation • Fines - of up to EUR 20m or 4% of annual global turnover for breaches of the rules • Breach notification: – Regulator - “without undue delay” and where feasible within 72 hours. – Affected Individuals – only where breaches likely to pose a high risk. • Data Protection Officers • Telecommunications, ISP’s, Financial Sector, Energy, Transport, Health.
  • 8. Prevention • Security awareness/education • Risk assessment • Policies and procedures • Vendor management • Incident Response Plan • Data Recovery Plan • Business Continuity Plan • Cyber Insurance 8
  • 9. 9 A Simplified Overview of a Data Breach
  • 11. Cyber Insurance (Network security and privacy) GAP analysis 11
  • 12. Claims Payouts by Type of Cost 12 NetDiligence Report 2015 – Cyber Liability and Data Breach Insurance Claims
  • 13. Claims by Cause of Loss 13 NetDiligence Report 2015 – Cyber Liability and Data Breach Insurance Claims
  • 14. Claims Allocation by Business Sector 14 NetDiligence Report 2015 – Cyber Liability and Data Breach Insurance Claims
  • 15. How do insurers rate cyber risk? • Industry / turnover • Data – amount and type • Reliance on IT network for operations • IT Security, Policies and Procedures • Compliance with regulations (Data Protection Act, Industry PCI, etc) • Employee training • Firewalls, Encryption.. • Access controls • Readiness to deal with an incident • Cyber risk culture – internally and externally • Claims experience 15
  • 16. What are insurers looking for in terms of cyber risk management • IT Security • Encryption, Industry Standards, Access Management, Patch Management • Are you ready for a breach? • Having a tested response plan in place which details how you will respond to a breach can make your response more efficient and effective • Are you considering and managing cyber risks at an organisational level? • It is a myth that cyber risks are only the responsibility of the IT department • Have you considered the Human Element? • The Verizon, 2015 Data Breach Investigations Report, which collected information on 100,000+ incidents over the last 10 years, shows that 50% of breaches within organisations in 2014 were caused by human error • Supply chain management • Auditing and restriction of access 16
  • 17. 17
  • 18. 18
  • 19. Beazley Global Breach Solution • An insurance solution with comprehensive mitigation services for privacy and security risks. • 3.500+ breaches managed • 80% of claims spend on service and managing breaches. • Advisen Award 2015: Beazley Breach Response Team 19
  • 21. What Every CISO Needs to Know About Cyber Insurance 21
  • 24. Historical Development of Cyber (Re)Insurance 24
  • 25. Insurance Covers at a Glance First-party coverage include: • Theft and fraud. Covers destruction or loss of the policyholder's data as the result of a criminal or fraudulent cyber event. • Forensic investigation. Covers the legal, technical or forensic services necessary to assess whether a cyber attack has occurred, to assess the impact of the attack and to stop an attack. • Business interruption. Covers lost income and related costs where a policyholder is unable to conduct business due to a cyber event or data loss. • Extortion. Provides coverage for the costs associated with the investigation of threats to commit cyber attacks against the policyholder's systems and for payments to extortionists who threaten to obtain and disclose sensitive information. • Computer data loss and restoration. Covers physical damage to, or loss of use of, computer-related assets, including the costs of retrieving and restoring data, hardware, software or other information destroyed or damaged as the result of a cyber attack. 25
  • 26. Insurance Covers at a Glance Third-party coverage include: • Litigation and regulatory. Covers the costs associated with civil lawsuits, judgments, settlements or penalties resulting from a cyber event. • Regulatory response. Covers the legal, technical or forensic services necessary to assist the policyholder in responding to governmental inquiries relating to a cyber attack, and provides coverage for fines, penalties, investigations or other regulatory actions. • Notification costs. Covers the costs to notify customers, employees or other victims affected by a cyber event, including notice required by law. • Crisis management. Covers crisis management and public relations expenses incurred to educate customers concerning a cyber event and the policyholder's response, including the cost of advertising for this purpose. • Media liability. Provides coverage for media liability, including coverage for copyright, trademark or service mark infringement resulting from online publication by the insured. 26
  • 29. More Information 29 CROMAR Insurance Brokers LTD, LLOYD's Coverholder Athens, Ag. Konstantinou 17 & Ag. Anargiron - 151 24 Marousi Τ: +30 210 80 28 946-7, F: +30 210 80 29 055 Thessaloniki, Politechniou 24 – 546 25, T: +30 2310 50 2506, F: +30 2310 52 6028 http://www.cromar.gr Nikos Georgopoulos Cyber Risks Advisor TEL. 6948 365033 Email: nikos.georgopoulos@cromar.gr