SlideShare a Scribd company logo
1 of 22
Download to read offline
Does it pay to be cyber-insured
Dr. Marie Moe
Research Scientist, SINTEF ICT, @MarieGMoe
Mr. Eireann Leverett
Founder and CEO, Concinnity Risks, @blackswanburst @concinnityrisks
Key issues
• Where do insurance companies best fit in to
the incident response lifecycle?
• How can CERTs collaborate with insurance
companies to mitigate and minimise costs of
cyber incidents?
• What language do CERTs need to speak to
interact efficiently with insurers?
• Why modelling is important
Myths and Facts
• They	already	have.	*cough*	German	Steel	Mill	*cough*They	won’t	pay	out
• If	you	can’t	attribute,	how	can	they?
Cyber	war/nation	
state/APT	is	excluded
• It	should	come	from	your	POST	incident	budget
• You	do	divide	budget	into	PRE	and	POST,	right?
It	steals	my	security	
budget
• They	hire	us,	as	the	market	grows
• They’re	not	fire,	auto,	or	aircraft	experts	either
• They	progress	the	art	of	security	at	higher	abstraction
They	don’t	know	
anything
Traditional risk management
accept	 reduce	
share avoid
You	know	this	story	already:
v too	much	acceptance,	
v a	little	reduction,	
v a	pinch	of	avoidance
v hardly	any	sharing.
So	let’s	play	what	if…
What if we share:
cyber-insurance
Cyber:
•Breach
•DDoS
•Business	Interruption
•Contingent	Business	
Interruption
•Financial	Fraud
•Ransom/Ransomware
•OT	(physical	damage	in	
engineering	lines)
Traditional
• Material	Damage
• Directors	and	Officers
• Commercial	General	
Liability
• Construction
• Life
• Event	cancellation
Example: Cloud outage
Source:	https://forums.aws.amazon.com/thread.jspa?threadID=65649
T1
T2
T3
Consequence	/	SLE
Likelihood	/	ARO
R
Treatment	effect
Treatment	cost
Cyber-insurance in risk
management
• SLE: Single loss expectancy
• ARO: Annual rate of occurrence
• ALE: Annualized loss expectancy
7
ALE
Acceptance
R T1 T2 T3
Insurance
Treatment
Risk
Exclusions matter
• Without “cyber exclusions” traditional insurance
covers cyber losses.
• THINK ABOUT THAT
• My lawyer got hit by ransomware…
• Travelers Insurance vs Portal Healthcare
Solutions…
• Let’s talk about FLEXA
Cyber Exclusions for
Traditional Insurance
• NMA 2912 AND 2928
• NMA 2912 excludes losses arising out of the "(i) loss of, alteration of, or damage to, or (ii)
a reduction in the functionality, availability or operation of" computer systems, hardware,
programs, software, data information repository, microchip, integrated circuit or similar
devices in computer equipment or non-computer equipment
• NMA 2914 AND 2915
• NMA 2914 and 2915 exclude loss, damage, destruction, distortion, erasure, corruption or
alteration of electronic data, and any loss of use, reduction in functionality, cost, expense
of whatever nature resulting from that loss of data. Data is defined in the clause, and is
said to include software.
• CL 380
• CL380 is the widest of the exclusions, and is in common usage in upstream energy
policies. It excludes all loss, damage and liability directly or indirectly caused by,
contributed to by, or arising from, the use or operation "as a means for inflicting harm" of
any computer, computer system, computer software program, malicious code, computer
virus or process or any other electronic system.
• ADVANCED CYBER EXCLUSION CLAUSES BEING DRAFTED
Why should CERTs care about
cyber-insurance?
• A common interest in detection, response and
prevention of loss
• A new strong stakeholder in the threat
intelligence and info sharing “market”
• Outsourcing of risk
• Outsourcing/collaboration on CERT services
• Business opportunities in partnering with
insurance companies
How do insurers choose their
customers?
Key	risk	
factors
Constraints
Making	
compro-
mises
• Key	information	 to	collect
• Key	measures	to	monitor
• Accumulated	risk
• Catastrophic	event	risk
• In-house	competence
• Available	data
• Building	customer	base
• Efficient	processes	vs	trust	in	data
• 3rd	parties	vs	in-house	capacity
• Baseline	requirements	vs	sales
Speaking different languages/
Learning to collaborate
They	need	your	
data	to	make	
models
• This	brings	down	
the	cost
We	need	some	
of	their	cash	
and	enthusiasm
They	need	our:
• Training
• Services
• Data
• History
• Collaboration
We	need	their	
patient	market	
interventions
They	need	our
expertise	when
evaluating	the	
risk	of	their	
customers
Interfaces in other teams
Build	interfaces	today	with	insurers
Initially	through	Marie	and	
Eireann
They	might	
give	you	
work
Or	might	
take	work	
from	you
Ideally	they	deal	with	boring	incidents
We	get	
more	time	
to	work	on	
emerging	
threats
They	reward	
mitigation	
toolsmithing
They	need	
threat	intel	
and	“near	
miss”	data
Our	DFIR	
innovations	
get	valued!
Cost	
effective
The incident response life cycle
NIST SP 800-61,Revision 2
Where does cyber-insurance
come in to play?
• Triggered	for	large	incidents?
• A	feed	of	incidents	to	work?
Where	do	we	
want	it	to	come	in	
to	play?
• Public	Private	Partnership	management?
• Risk	Models?
Data	sharing?
• Test	Lab	creation?
• Standards	management?
Market	
interventions
16
Intrusion Detection Cleaned up?
When to report?
• Think about two reports: insurance and CERT
• Most reporting happens after an incident has
been detected
• Insurers offer rapid-response services to quickly assess a
possible intrusion after detection
• What about undetected intrusions?
• Reporting of near-misses and prevented incidents gives
valuable threat intelligence
• Customers may be reluctant to disclose their vulnerabilities
• Can insurers provide incentives?
How to calculate the cost of an
incident?
Defender
a) Cost of preparing to respond
b) Cost of response ( b > a)
c) Loss (c >> a+b)
d) Cost of insurance (d > a+b)
e) Insurance payout (e < c)
Attacker
a) Cost of preparing and
executing attack
b) Profit (b >> a)
c) Penalty (c << a+b)
When does it pay to be cyber-
insured?
• When the cost of insurance is lower than the
expected loss
• When insecurity is great and unpredictable
• When the consequences are catastrophic
• When the victim does not have enough
resources to handle the consequences
Cyber-insurance as risk control
strategy
• Risks can be controlled by:
• Avoidance
• Mitigation
• Acceptance
• Termination
• Transfer or share
• What is the benefit of risk transfer?
Conclusions
• It’s here, and paying out
• You might as well meet them, understand
them, learn from them, and teach them
• Watch those exclusions
• Some incidents could be referred to insurers!
• Or costs reclaimed?!?
Questions?
Dr. Marie Moe
@MarieGMoe
marie.moe@sintef.no
Mr. Eireann Leverett
@blackswanburst, @concinnityrisks
eireann.leverett@cantab.net

More Related Content

What's hot

Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 DecXavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 DecLaura Tibbo
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...SurfWatch Labs
 
MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...
MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...
MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...Citrin Cooperman
 
Sensible defence
Sensible defenceSensible defence
Sensible defenceKoen Maris
 
Cybersecurity During the COVID Era
Cybersecurity During the COVID EraCybersecurity During the COVID Era
Cybersecurity During the COVID EraCitrin Cooperman
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsPaul Feldman
 
What to Do Before a Cyber Incident Occurs
What to Do Before a Cyber Incident OccursWhat to Do Before a Cyber Incident Occurs
What to Do Before a Cyber Incident OccursColleen Beck-Domanico
 
Cyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapCyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapDavid Sweigert
 
Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)Alex Yates
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsColleen Beck-Domanico
 
Common and Concerning Risks In IT
Common and Concerning Risks In ITCommon and Concerning Risks In IT
Common and Concerning Risks In ITpbhugenberg3
 
A W W A Presentation Regional Paper David Mc Cann
A W W A  Presentation    Regional Paper     David  Mc CannA W W A  Presentation    Regional Paper     David  Mc Cann
A W W A Presentation Regional Paper David Mc CannWivenhoe Management Group
 
ATOS: Preparing your business to manage cyber incidents
ATOS: Preparing your business to manage cyber incidentsATOS: Preparing your business to manage cyber incidents
ATOS: Preparing your business to manage cyber incidentsbcilondonforum
 
Ey Asia-Pacific Cyber Case Competition 2019
Ey Asia-Pacific Cyber Case Competition 2019Ey Asia-Pacific Cyber Case Competition 2019
Ey Asia-Pacific Cyber Case Competition 2019Pinzhang Chen 陈品璋
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber ResiliencePeter Wood
 
Security vulnerability assessment & liability(li)
Security vulnerability assessment & liability(li)Security vulnerability assessment & liability(li)
Security vulnerability assessment & liability(li)Wivenhoe Management Group
 
Security Awareness: The Best Defence
Security Awareness: The Best DefenceSecurity Awareness: The Best Defence
Security Awareness: The Best DefenceShawn Brown
 

What's hot (20)

Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 DecXavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
 
MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...
MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...
MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...
 
What is cyber resilience?
What is cyber resilience?What is cyber resilience?
What is cyber resilience?
 
Sensible defence
Sensible defenceSensible defence
Sensible defence
 
Cybersecurity During the COVID Era
Cybersecurity During the COVID EraCybersecurity During the COVID Era
Cybersecurity During the COVID Era
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
 
What to Do Before a Cyber Incident Occurs
What to Do Before a Cyber Incident OccursWhat to Do Before a Cyber Incident Occurs
What to Do Before a Cyber Incident Occurs
 
Cyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapCyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model Roadmap
 
Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
 
Common and Concerning Risks In IT
Common and Concerning Risks In ITCommon and Concerning Risks In IT
Common and Concerning Risks In IT
 
Adequate securitynew1404.019
Adequate securitynew1404.019Adequate securitynew1404.019
Adequate securitynew1404.019
 
Wivenhoe Management Group[2]
Wivenhoe Management Group[2]Wivenhoe Management Group[2]
Wivenhoe Management Group[2]
 
A W W A Presentation Regional Paper David Mc Cann
A W W A  Presentation    Regional Paper     David  Mc CannA W W A  Presentation    Regional Paper     David  Mc Cann
A W W A Presentation Regional Paper David Mc Cann
 
ATOS: Preparing your business to manage cyber incidents
ATOS: Preparing your business to manage cyber incidentsATOS: Preparing your business to manage cyber incidents
ATOS: Preparing your business to manage cyber incidents
 
Ey Asia-Pacific Cyber Case Competition 2019
Ey Asia-Pacific Cyber Case Competition 2019Ey Asia-Pacific Cyber Case Competition 2019
Ey Asia-Pacific Cyber Case Competition 2019
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
Security vulnerability assessment & liability(li)
Security vulnerability assessment & liability(li)Security vulnerability assessment & liability(li)
Security vulnerability assessment & liability(li)
 
Security Awareness: The Best Defence
Security Awareness: The Best DefenceSecurity Awareness: The Best Defence
Security Awareness: The Best Defence
 

Similar to Does it pay to be cyber-insured

Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber riskaakash malhotra
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...Citrin Cooperman
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksThis account is closed
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate PerspectiveDawn Yankeelov
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to knowNathan Desfontaines
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...James Fisher
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxcaniceconsulting
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
 
Infocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationInfocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationEthos Media S.A.
 
Debunking Myths for Cyber-Insurance
Debunking Myths for Cyber-InsuranceDebunking Myths for Cyber-Insurance
Debunking Myths for Cyber-InsurancePriyanka Aash
 
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Fujitsu Middle East
 

Similar to Does it pay to be cyber-insured (20)

Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber risk
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
NCVO/Zurich webinar: Beyond cyber essentials
NCVO/Zurich webinar: Beyond cyber essentialsNCVO/Zurich webinar: Beyond cyber essentials
NCVO/Zurich webinar: Beyond cyber essentials
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptx
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Infocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationInfocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar Presentation
 
Debunking Myths for Cyber-Insurance
Debunking Myths for Cyber-InsuranceDebunking Myths for Cyber-Insurance
Debunking Myths for Cyber-Insurance
 
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
 

More from Marie Elisabeth Gaup Moe

Med hjertet på Internett - Sikkerhet i min personlige infrastruktur
Med hjertet på Internett - Sikkerhet i min personlige infrastrukturMed hjertet på Internett - Sikkerhet i min personlige infrastruktur
Med hjertet på Internett - Sikkerhet i min personlige infrastrukturMarie Elisabeth Gaup Moe
 
Når cyberangrep får fysiske konsekvenser
Når cyberangrep får fysiske konsekvenserNår cyberangrep får fysiske konsekvenser
Når cyberangrep får fysiske konsekvenserMarie Elisabeth Gaup Moe
 
Software Security: Hvordan bygge sikre systemer?
Software Security: Hvordan bygge sikre systemer?Software Security: Hvordan bygge sikre systemer?
Software Security: Hvordan bygge sikre systemer?Marie Elisabeth Gaup Moe
 
Unpatchable: Living with a vulnerable implanted device
Unpatchable: Living with a vulnerable implanted deviceUnpatchable: Living with a vulnerable implanted device
Unpatchable: Living with a vulnerable implanted deviceMarie Elisabeth Gaup Moe
 
Informasjonssikkerhet og personvern: Hva må vi tenke på ved tilgjengeliggjøri...
Informasjonssikkerhet og personvern: Hva må vi tenke på ved tilgjengeliggjøri...Informasjonssikkerhet og personvern: Hva må vi tenke på ved tilgjengeliggjøri...
Informasjonssikkerhet og personvern: Hva må vi tenke på ved tilgjengeliggjøri...Marie Elisabeth Gaup Moe
 
Er smarte systemer dumme på sikkerhet? -Hvordan ITS krever enda mer intellige...
Er smarte systemer dumme på sikkerhet? -Hvordan ITS krever enda mer intellige...Er smarte systemer dumme på sikkerhet? -Hvordan ITS krever enda mer intellige...
Er smarte systemer dumme på sikkerhet? -Hvordan ITS krever enda mer intellige...Marie Elisabeth Gaup Moe
 

More from Marie Elisabeth Gaup Moe (13)

Cyberforsikring - Når lønner det seg?
Cyberforsikring - Når lønner det seg?Cyberforsikring - Når lønner det seg?
Cyberforsikring - Når lønner det seg?
 
Med hjertet på Internett - Sikkerhet i min personlige infrastruktur
Med hjertet på Internett - Sikkerhet i min personlige infrastrukturMed hjertet på Internett - Sikkerhet i min personlige infrastruktur
Med hjertet på Internett - Sikkerhet i min personlige infrastruktur
 
Når cyberangrep får fysiske konsekvenser
Når cyberangrep får fysiske konsekvenserNår cyberangrep får fysiske konsekvenser
Når cyberangrep får fysiske konsekvenser
 
Unpatchable: Troopers 2016 edition
Unpatchable: Troopers 2016 editionUnpatchable: Troopers 2016 edition
Unpatchable: Troopers 2016 edition
 
From Ukraine to Pacemakers!
From Ukraine to Pacemakers!From Ukraine to Pacemakers!
From Ukraine to Pacemakers!
 
Sikkerhet i Internet of Things
Sikkerhet i Internet of ThingsSikkerhet i Internet of Things
Sikkerhet i Internet of Things
 
Unpatchable: 32C3 edition
Unpatchable: 32C3 editionUnpatchable: 32C3 edition
Unpatchable: 32C3 edition
 
Software Security: Hvordan bygge sikre systemer?
Software Security: Hvordan bygge sikre systemer?Software Security: Hvordan bygge sikre systemer?
Software Security: Hvordan bygge sikre systemer?
 
Unpatchable: Living with a vulnerable implanted device
Unpatchable: Living with a vulnerable implanted deviceUnpatchable: Living with a vulnerable implanted device
Unpatchable: Living with a vulnerable implanted device
 
Informasjonssikkerhet og personvern: Hva må vi tenke på ved tilgjengeliggjøri...
Informasjonssikkerhet og personvern: Hva må vi tenke på ved tilgjengeliggjøri...Informasjonssikkerhet og personvern: Hva må vi tenke på ved tilgjengeliggjøri...
Informasjonssikkerhet og personvern: Hva må vi tenke på ved tilgjengeliggjøri...
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
 
NorCERT - Hva gjør vi når det brenner?
NorCERT - Hva gjør vi når det brenner?NorCERT - Hva gjør vi når det brenner?
NorCERT - Hva gjør vi når det brenner?
 
Er smarte systemer dumme på sikkerhet? -Hvordan ITS krever enda mer intellige...
Er smarte systemer dumme på sikkerhet? -Hvordan ITS krever enda mer intellige...Er smarte systemer dumme på sikkerhet? -Hvordan ITS krever enda mer intellige...
Er smarte systemer dumme på sikkerhet? -Hvordan ITS krever enda mer intellige...
 

Recently uploaded

Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja Nehwal
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfGale Pooley
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfGale Pooley
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130Suhani Kapoor
 
Dividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxDividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxanshikagoel52
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designsegoetzinger
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...Call Girls in Nagpur High Profile
 
The Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfThe Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfGale Pooley
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfGale Pooley
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignHenry Tapper
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfGale Pooley
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfGale Pooley
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...ssifa0344
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptxFinTech Belgium
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfMichael Silva
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfGale Pooley
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...ssifa0344
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptxFinTech Belgium
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...ssifa0344
 

Recently uploaded (20)

Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdf
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdf
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
 
Dividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxDividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptx
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designs
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
 
The Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfThe Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdf
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdf
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaign
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdf
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdf
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdf
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
 

Does it pay to be cyber-insured

  • 1. Does it pay to be cyber-insured Dr. Marie Moe Research Scientist, SINTEF ICT, @MarieGMoe Mr. Eireann Leverett Founder and CEO, Concinnity Risks, @blackswanburst @concinnityrisks
  • 2. Key issues • Where do insurance companies best fit in to the incident response lifecycle? • How can CERTs collaborate with insurance companies to mitigate and minimise costs of cyber incidents? • What language do CERTs need to speak to interact efficiently with insurers? • Why modelling is important
  • 3. Myths and Facts • They already have. *cough* German Steel Mill *cough*They won’t pay out • If you can’t attribute, how can they? Cyber war/nation state/APT is excluded • It should come from your POST incident budget • You do divide budget into PRE and POST, right? It steals my security budget • They hire us, as the market grows • They’re not fire, auto, or aircraft experts either • They progress the art of security at higher abstraction They don’t know anything
  • 4. Traditional risk management accept reduce share avoid You know this story already: v too much acceptance, v a little reduction, v a pinch of avoidance v hardly any sharing. So let’s play what if…
  • 5. What if we share: cyber-insurance Cyber: •Breach •DDoS •Business Interruption •Contingent Business Interruption •Financial Fraud •Ransom/Ransomware •OT (physical damage in engineering lines) Traditional • Material Damage • Directors and Officers • Commercial General Liability • Construction • Life • Event cancellation
  • 7. T1 T2 T3 Consequence / SLE Likelihood / ARO R Treatment effect Treatment cost Cyber-insurance in risk management • SLE: Single loss expectancy • ARO: Annual rate of occurrence • ALE: Annualized loss expectancy 7 ALE Acceptance R T1 T2 T3 Insurance Treatment Risk
  • 8. Exclusions matter • Without “cyber exclusions” traditional insurance covers cyber losses. • THINK ABOUT THAT • My lawyer got hit by ransomware… • Travelers Insurance vs Portal Healthcare Solutions… • Let’s talk about FLEXA
  • 9. Cyber Exclusions for Traditional Insurance • NMA 2912 AND 2928 • NMA 2912 excludes losses arising out of the "(i) loss of, alteration of, or damage to, or (ii) a reduction in the functionality, availability or operation of" computer systems, hardware, programs, software, data information repository, microchip, integrated circuit or similar devices in computer equipment or non-computer equipment • NMA 2914 AND 2915 • NMA 2914 and 2915 exclude loss, damage, destruction, distortion, erasure, corruption or alteration of electronic data, and any loss of use, reduction in functionality, cost, expense of whatever nature resulting from that loss of data. Data is defined in the clause, and is said to include software. • CL 380 • CL380 is the widest of the exclusions, and is in common usage in upstream energy policies. It excludes all loss, damage and liability directly or indirectly caused by, contributed to by, or arising from, the use or operation "as a means for inflicting harm" of any computer, computer system, computer software program, malicious code, computer virus or process or any other electronic system. • ADVANCED CYBER EXCLUSION CLAUSES BEING DRAFTED
  • 10. Why should CERTs care about cyber-insurance? • A common interest in detection, response and prevention of loss • A new strong stakeholder in the threat intelligence and info sharing “market” • Outsourcing of risk • Outsourcing/collaboration on CERT services • Business opportunities in partnering with insurance companies
  • 11. How do insurers choose their customers? Key risk factors Constraints Making compro- mises • Key information to collect • Key measures to monitor • Accumulated risk • Catastrophic event risk • In-house competence • Available data • Building customer base • Efficient processes vs trust in data • 3rd parties vs in-house capacity • Baseline requirements vs sales
  • 12. Speaking different languages/ Learning to collaborate They need your data to make models • This brings down the cost We need some of their cash and enthusiasm They need our: • Training • Services • Data • History • Collaboration We need their patient market interventions They need our expertise when evaluating the risk of their customers
  • 13. Interfaces in other teams Build interfaces today with insurers Initially through Marie and Eireann They might give you work Or might take work from you Ideally they deal with boring incidents We get more time to work on emerging threats They reward mitigation toolsmithing They need threat intel and “near miss” data Our DFIR innovations get valued! Cost effective
  • 14. The incident response life cycle NIST SP 800-61,Revision 2
  • 15. Where does cyber-insurance come in to play? • Triggered for large incidents? • A feed of incidents to work? Where do we want it to come in to play? • Public Private Partnership management? • Risk Models? Data sharing? • Test Lab creation? • Standards management? Market interventions
  • 17. When to report? • Think about two reports: insurance and CERT • Most reporting happens after an incident has been detected • Insurers offer rapid-response services to quickly assess a possible intrusion after detection • What about undetected intrusions? • Reporting of near-misses and prevented incidents gives valuable threat intelligence • Customers may be reluctant to disclose their vulnerabilities • Can insurers provide incentives?
  • 18. How to calculate the cost of an incident? Defender a) Cost of preparing to respond b) Cost of response ( b > a) c) Loss (c >> a+b) d) Cost of insurance (d > a+b) e) Insurance payout (e < c) Attacker a) Cost of preparing and executing attack b) Profit (b >> a) c) Penalty (c << a+b)
  • 19. When does it pay to be cyber- insured? • When the cost of insurance is lower than the expected loss • When insecurity is great and unpredictable • When the consequences are catastrophic • When the victim does not have enough resources to handle the consequences
  • 20. Cyber-insurance as risk control strategy • Risks can be controlled by: • Avoidance • Mitigation • Acceptance • Termination • Transfer or share • What is the benefit of risk transfer?
  • 21. Conclusions • It’s here, and paying out • You might as well meet them, understand them, learn from them, and teach them • Watch those exclusions • Some incidents could be referred to insurers! • Or costs reclaimed?!?
  • 22. Questions? Dr. Marie Moe @MarieGMoe marie.moe@sintef.no Mr. Eireann Leverett @blackswanburst, @concinnityrisks eireann.leverett@cantab.net