SlideShare a Scribd company logo
1 of 29
Download to read offline
SESSION ID:SESSION ID:
#RSAC
David Nathans
Cyber-Insurance: Fraud, Waste or
Abuse?
STR-F03
Director of Security
SOCSoter, Inc.
@Zourick
#RSAC
2
One Size Does Not Fit All
Cyber Insurance overview
#RSAC
Our Research
3
Reviewed many major policies
and some not so major…
Spoke with Insurance agencies
Spoke with Insurance agents
Reviewed policies currently held by customers
Got paid by insurance companies to perform Incident Response,
forensics and breach analysis
#RSAC
Types of Insurance
4
Loss of digital assets
Damage, alteration, corruption, distortion, theft, misuse, distortion (caused by
damage or destruction, operational mistakes, computer crime such as malware,
etc) ** NOT RANSOMWARE
Non-physical business interruption
interruption, degradation in service (caused by damage or destruction,
operational mistakes, computer crime such as malware, etc)
Cyber Extortion Threat
Must get express written consent to pay from insurance company and contact
authorities (FBI) all prior to paying any extortion money
#RSAC
Types of Insurance
5
Security Event Costs / Crisis Management
Covers costs associated with resolving a breach, fines by government,
regulatory or civil court. Other money for brand harm
Network security and privacy
Covers claims against you for acts, errors & omissions made by you and your
contractors that results in a breach. (Not your breach, this is for a breach you
caused somewhere else)
#RSAC
Types of Insurance
6
Employee Privacy Liability
Covers damages to employees resulting in a breach
Electronic Media Liability
Covers plagiarism or copyright infringement on your website
Cyber Terrorism
Covers system outage due to terrorism (gov, political, ideological
motivation)
#RSAC
Types of Insurance
7
Identity theft
Covers the specific costs associated with notification of victims, credit monitoring,
etc.
Security breach remediation and notification
Covers the cost of Incident response and legal notifications
Funds transfer fraud
Covers loss resulting directly from the use of any computer to fraudulently
transfer insured property from inside the insured premises or bank premises to a
person or place outside of the insured's premises or bank's premises
#RSAC
Types of Insurance
Network security
Covers a breach as a result of missing or misconfigured security services such as
Firewalls, Intrusion Detection systems or missing anti-virus
Malware liability
Covers the cleanup and removal of viruses that infect external entities as a
result of attackers using internal systems to spread infection via email or web.
Indirect cost coverage
Covers the cost of going out of business when a breach results in the loss of
Intellectual property that makes a company no longer competitive in the
marketplace
8
#RSAC
Types of Insurance
Network security
Covers a breach as a result of missing or misconfigured security services such
as Firewalls, Intrusion Detection systems or missing anti-virus
Malware liability
Covers the cleanup and removal of viruses that infect external entities as a
result of attackers using internal systems to spread infection via email or web.
Indirect cost coverage
Covers the cost of going out of business when a breach results in the loss of
Intellectual property that makes a company no longer competitive in the
marketplace
9
#RSAC
Fraud?
10
#RSAC
Fraud?
“Forced”* PCI Compliance Fees
• Forced because they will waive the fee if you have a report of compliance
from a registered PCI Qualified Security Assessor (QSA)
11
#RSAC
Fraud?
What do you get for these fees?
Security Awareness Training: We partnered with security experts to give you easy
to understand security awareness training. Consuming this content will help you
protect your digital assets against common threats (such as phishing scams and
keylogging malware attacks).
— Web based training
Threat Prevention Tools: Cybercriminals value credit card data and target
vulnerable businesses that accept it as a form of payment. Threat prevention tools
simplify PCI compliance and raise your cyber-defenses, making it easier to meet
PCI Data Security Standards and fight cybercrime.
— Vulnerability scan
12
#RSAC
Fraud?
What do you get for these fees?
Card Data Breach Protection: With the rise of Advanced Persistent Threats (APTs), it
is impossible to be 100% certain that your business will be safe from
cybercrime. To give you peace of mind, your PCI service provides up to $50,000 in
coverage for two large, unexpected expenses from a breach. Such as:
— Forensic exams completed by QSA (Qualified Security Assessor)
— Fines levied by card issuers (Visa, MasterCard, AMEX, and Discover)
13
#RSAC
Waste?
According to AIG, insurance underwriters
collected $1.6 billion in premium income
in 2015.
Allianz projects premium income
to grow to $20 billion by 2025.
14
#RSAC
Waste?
15
#RSAC
Abuse?
Things to think about when looking at purchasing a policy
Does the insurance broker you’re working with have extensive cyber insurance
experience?
Is the policy you’re considering the right one for your specific cyber and data
risks and coverage needs?
What types of breaches does the policy cover?
What types of claims does the policy exclude?
Does the insurance broker or cyber insurer offer any tools or resources to its
policyholders?
Can you name your own legal team, IT provider, Managed Security Service
Provider?
116
#RSAC
Secrets
As a security practitioner, how do you use insurance to your
advantage?
Follow the policy requirements and evaluate exclusions
Check the box!!!
17
#RSAC
Policy Requirements
Firewall and firewall rule management
Virus scans
Named person responsible for security
Data restrictions and controls
Documented hiring process for employees
No previous history of security issues (or higher premiums)
18
#RSAC
Policy Requirements
Encryption at rest, transit and access via mobile devices, are devices
encrypted
Understanding of types of data collected
Written Policies reviewed by an attorney and acknowledged by
employees
Network monitoring & Intrusion detection
Incident response procedures
19
#RSAC
Policy Requirements
20
#RSAC
Policy Requirements
Documented data destruction policies
Access and authorization controls for all users and contractors
Performance of penetration testing and vulnerability scans of
networks and devices
21
#RSAC
$$$
Average cost of yearly premiums for smaller businesses
$1,000 to $5,000
Depends on:
— Size of business in revenue
— Type of data
— Number of potential records
Average cost of yearly premiums for larger businesses
$30,000 to $500,000 (or more)
Depends on:
— All the above + customizations + amount of coverage
22
#RSAC
Take away
Cybersecurity management company MUST be added by endorsement to the
policy or you get what they give you.
Knowledgeable person has to notify insurance company of a loss inwriting
within 60 days, company must provided detailed proof of all circumstances
leading to the loss event. Including, description of the incident, equipment list
involved, logs, security logs, statements from outside experts and description
of digital assets involved.
Company must take reasonable steps to protect from further loss or damage
including ensuring all traces of malware have been removed.
Must provide final statement of loss within 120 days after discovery of loss.
23
#RSAC
Take away
Policies will not cover ANYTHING if an executive officer is aware of a
condition that would reasonably be regarded as a basis for the claim.
(if they knew about vulnerabilities but did nothing about it and got
breached)
Will not cover if claim is based on a Wrongful act = failure to prevent
unauthorized access or use electronic or non-electronic data
containing PII, failure to prevent the transmission of a virus to
someone else, failure to provide notification of an actual or potential
unauthorized access to PII
24
#RSAC
Take away
Things to think about AFTER purchasing a policy
How does insurance modify your Incident Response processes?
Where are your security gaps that insurance does not cover?
Where do you invest in cyber security?
How do you train your staff to comply with your policy
25
#RSAC
How to get a great policy?
Have a great insurance agent
Who does not laugh when you say Cyber
Who carries multiple products to choose from
Who can help you fill out the application
Who knows how to get customizations
Who has access to cyber resources in your area
25
#RSAC
Final Thought
Insurance companies will begin to really help change
the executive mindset of cyber security when premiums
are based off the value scale.
Actually be secure or pay more for insurance
26
#RSAC
Questions?
27
SESSION ID:SESSION ID:
#RSAC
David Nathans
Cyber-Insurance: Fraud, Waste or
Abuse?
STR-F03
Director of Security
SOCSoter, Inc.
@Zourick

More Related Content

What's hot

Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsSarah Cirelli
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Netpluz Asia Pte Ltd
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Netpluz Asia Pte Ltd
 
Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorFarook Al-Jibouri
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsColleen Beck-Domanico
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019SrikanthRaju7
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...Nicolas Beyer
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionNext Dimension Inc.
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance TempRohan Sehgal
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...Michael Noel
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentationEthan S. Burger
 
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit WondersInternetwork Engineering (IE)
 
Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectivesSensePost
 

What's hot (20)

Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
 
Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial Sector
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
 
Window of Compromise
Window of CompromiseWindow of Compromise
Window of Compromise
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
2019 Cyber Security Trends
2019 Cyber Security Trends2019 Cyber Security Trends
2019 Cyber Security Trends
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
 
Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectives
 

Similar to Cyber insurance : Fraud, waste or abuse?

Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowShantam Goel
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftCBIZ, Inc.
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber InsuranceJohn Ryan
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Online Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client AccountsOnline Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client Accountscorelink11
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Sam Norallah
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliabilitycaca1009
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutionsharman041
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023CBIZ, Inc.
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!topseowebmaster
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guidelarry1401
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1NetWatcher
 
Cyber Security Services for Business.pdf
Cyber Security Services for Business.pdfCyber Security Services for Business.pdf
Cyber Security Services for Business.pdfVograce
 
Client Briefing - Better information leads to better cyber coverage
Client Briefing - Better information leads to better cyber coverageClient Briefing - Better information leads to better cyber coverage
Client Briefing - Better information leads to better cyber coverageChris Beh
 

Similar to Cyber insurance : Fraud, waste or abuse? (20)

Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Online Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client AccountsOnline Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client Accounts
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
Simple Safe Steps to Cyber Security
Simple Safe Steps to Cyber SecuritySimple Safe Steps to Cyber Security
Simple Safe Steps to Cyber Security
 
Cyber Security Services for Business.pdf
Cyber Security Services for Business.pdfCyber Security Services for Business.pdf
Cyber Security Services for Business.pdf
 
Client Briefing - Better information leads to better cyber coverage
Client Briefing - Better information leads to better cyber coverageClient Briefing - Better information leads to better cyber coverage
Client Briefing - Better information leads to better cyber coverage
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Cyber insurance : Fraud, waste or abuse?

  • 1. SESSION ID:SESSION ID: #RSAC David Nathans Cyber-Insurance: Fraud, Waste or Abuse? STR-F03 Director of Security SOCSoter, Inc. @Zourick
  • 2. #RSAC 2 One Size Does Not Fit All Cyber Insurance overview
  • 3. #RSAC Our Research 3 Reviewed many major policies and some not so major… Spoke with Insurance agencies Spoke with Insurance agents Reviewed policies currently held by customers Got paid by insurance companies to perform Incident Response, forensics and breach analysis
  • 4. #RSAC Types of Insurance 4 Loss of digital assets Damage, alteration, corruption, distortion, theft, misuse, distortion (caused by damage or destruction, operational mistakes, computer crime such as malware, etc) ** NOT RANSOMWARE Non-physical business interruption interruption, degradation in service (caused by damage or destruction, operational mistakes, computer crime such as malware, etc) Cyber Extortion Threat Must get express written consent to pay from insurance company and contact authorities (FBI) all prior to paying any extortion money
  • 5. #RSAC Types of Insurance 5 Security Event Costs / Crisis Management Covers costs associated with resolving a breach, fines by government, regulatory or civil court. Other money for brand harm Network security and privacy Covers claims against you for acts, errors & omissions made by you and your contractors that results in a breach. (Not your breach, this is for a breach you caused somewhere else)
  • 6. #RSAC Types of Insurance 6 Employee Privacy Liability Covers damages to employees resulting in a breach Electronic Media Liability Covers plagiarism or copyright infringement on your website Cyber Terrorism Covers system outage due to terrorism (gov, political, ideological motivation)
  • 7. #RSAC Types of Insurance 7 Identity theft Covers the specific costs associated with notification of victims, credit monitoring, etc. Security breach remediation and notification Covers the cost of Incident response and legal notifications Funds transfer fraud Covers loss resulting directly from the use of any computer to fraudulently transfer insured property from inside the insured premises or bank premises to a person or place outside of the insured's premises or bank's premises
  • 8. #RSAC Types of Insurance Network security Covers a breach as a result of missing or misconfigured security services such as Firewalls, Intrusion Detection systems or missing anti-virus Malware liability Covers the cleanup and removal of viruses that infect external entities as a result of attackers using internal systems to spread infection via email or web. Indirect cost coverage Covers the cost of going out of business when a breach results in the loss of Intellectual property that makes a company no longer competitive in the marketplace 8
  • 9. #RSAC Types of Insurance Network security Covers a breach as a result of missing or misconfigured security services such as Firewalls, Intrusion Detection systems or missing anti-virus Malware liability Covers the cleanup and removal of viruses that infect external entities as a result of attackers using internal systems to spread infection via email or web. Indirect cost coverage Covers the cost of going out of business when a breach results in the loss of Intellectual property that makes a company no longer competitive in the marketplace 9
  • 11. #RSAC Fraud? “Forced”* PCI Compliance Fees • Forced because they will waive the fee if you have a report of compliance from a registered PCI Qualified Security Assessor (QSA) 11
  • 12. #RSAC Fraud? What do you get for these fees? Security Awareness Training: We partnered with security experts to give you easy to understand security awareness training. Consuming this content will help you protect your digital assets against common threats (such as phishing scams and keylogging malware attacks). — Web based training Threat Prevention Tools: Cybercriminals value credit card data and target vulnerable businesses that accept it as a form of payment. Threat prevention tools simplify PCI compliance and raise your cyber-defenses, making it easier to meet PCI Data Security Standards and fight cybercrime. — Vulnerability scan 12
  • 13. #RSAC Fraud? What do you get for these fees? Card Data Breach Protection: With the rise of Advanced Persistent Threats (APTs), it is impossible to be 100% certain that your business will be safe from cybercrime. To give you peace of mind, your PCI service provides up to $50,000 in coverage for two large, unexpected expenses from a breach. Such as: — Forensic exams completed by QSA (Qualified Security Assessor) — Fines levied by card issuers (Visa, MasterCard, AMEX, and Discover) 13
  • 14. #RSAC Waste? According to AIG, insurance underwriters collected $1.6 billion in premium income in 2015. Allianz projects premium income to grow to $20 billion by 2025. 14
  • 16. #RSAC Abuse? Things to think about when looking at purchasing a policy Does the insurance broker you’re working with have extensive cyber insurance experience? Is the policy you’re considering the right one for your specific cyber and data risks and coverage needs? What types of breaches does the policy cover? What types of claims does the policy exclude? Does the insurance broker or cyber insurer offer any tools or resources to its policyholders? Can you name your own legal team, IT provider, Managed Security Service Provider? 116
  • 17. #RSAC Secrets As a security practitioner, how do you use insurance to your advantage? Follow the policy requirements and evaluate exclusions Check the box!!! 17
  • 18. #RSAC Policy Requirements Firewall and firewall rule management Virus scans Named person responsible for security Data restrictions and controls Documented hiring process for employees No previous history of security issues (or higher premiums) 18
  • 19. #RSAC Policy Requirements Encryption at rest, transit and access via mobile devices, are devices encrypted Understanding of types of data collected Written Policies reviewed by an attorney and acknowledged by employees Network monitoring & Intrusion detection Incident response procedures 19
  • 21. #RSAC Policy Requirements Documented data destruction policies Access and authorization controls for all users and contractors Performance of penetration testing and vulnerability scans of networks and devices 21
  • 22. #RSAC $$$ Average cost of yearly premiums for smaller businesses $1,000 to $5,000 Depends on: — Size of business in revenue — Type of data — Number of potential records Average cost of yearly premiums for larger businesses $30,000 to $500,000 (or more) Depends on: — All the above + customizations + amount of coverage 22
  • 23. #RSAC Take away Cybersecurity management company MUST be added by endorsement to the policy or you get what they give you. Knowledgeable person has to notify insurance company of a loss inwriting within 60 days, company must provided detailed proof of all circumstances leading to the loss event. Including, description of the incident, equipment list involved, logs, security logs, statements from outside experts and description of digital assets involved. Company must take reasonable steps to protect from further loss or damage including ensuring all traces of malware have been removed. Must provide final statement of loss within 120 days after discovery of loss. 23
  • 24. #RSAC Take away Policies will not cover ANYTHING if an executive officer is aware of a condition that would reasonably be regarded as a basis for the claim. (if they knew about vulnerabilities but did nothing about it and got breached) Will not cover if claim is based on a Wrongful act = failure to prevent unauthorized access or use electronic or non-electronic data containing PII, failure to prevent the transmission of a virus to someone else, failure to provide notification of an actual or potential unauthorized access to PII 24
  • 25. #RSAC Take away Things to think about AFTER purchasing a policy How does insurance modify your Incident Response processes? Where are your security gaps that insurance does not cover? Where do you invest in cyber security? How do you train your staff to comply with your policy 25
  • 26. #RSAC How to get a great policy? Have a great insurance agent Who does not laugh when you say Cyber Who carries multiple products to choose from Who can help you fill out the application Who knows how to get customizations Who has access to cyber resources in your area 25
  • 27. #RSAC Final Thought Insurance companies will begin to really help change the executive mindset of cyber security when premiums are based off the value scale. Actually be secure or pay more for insurance 26
  • 29. SESSION ID:SESSION ID: #RSAC David Nathans Cyber-Insurance: Fraud, Waste or Abuse? STR-F03 Director of Security SOCSoter, Inc. @Zourick