SlideShare a Scribd company logo
1 of 9
Download to read offline
© 2014 Tressler LLP
Presented by:
Todd M. Rowe
Cyber Insurance Underwriters:
Your Country Needs You
April 13, 2016
© 2014 Tressler LLP
No Longer A Safe Harbor For Cyber Security
» Insurance Agreement
» Exclusions
» Portal Health Decision
Further Reading: April 12, 2016
Privacy Risk Report.
CGL Insurance Issues
2
© 2014 Tressler LLP
Emerging Issue For 2016:
Claims Related To The
“Internet of Things”
For Further Reading: January 27, 2016
Privacy Risk Report
First Party Property Insurance Issues
3
© 2014 Tressler LLP
Questions
» Does the company have a cyber-
incident response plan?
» Are subcontractors and suppliers
evaluated to ensure their adherence
to the company’s cyber
requirements?
» Does the firm engage in basic cyber
hygiene, such as the regular patching
of software and scanning for
malicious activity, and mandating a
multi-step identity check to access
company networks?
“Your Country Needs You”
4
Further Reading: September 11, 2015 Privacy Risk Report
© 2014 Tressler LLP
» D & O Underwriters Struggle
With The Lack Of Information
Related To Cyber Risks.
November 14, 2014
Privacy Risk Report
» Early Observations Concerning
The Sony Hack And
Cyberliability Insurance.
› “The strength of this insurance
will start with the underwriting
process.”
January 8, 2015
Privacy Risk Report
Privacy Risk Report Posts For
Underwriters
5
© 2014 Tressler LLP
Tort Source Fall 2015 Handout
Columbia Casualty Co. v.
Cottage Health System, 2:15-
cv-3432 (C.D. Cal. 2015)
The Current State Of Cyber Insurance Law
6
© 2014 Tressler LLP
“Think of a massive cyber-
attack as an intelligent
hurricane…If it hits a house
that doesn’t fall down it
learns why the house didn’t
fall and it changes.”
Data Breach/Cyber Security
Parting Note
7
© 2014 Tressler LLP
Another Parting Note
8
Thank you.
© 2014 Tressler LLP
www.privacyriskreport.com
Todd M. Rowe
312.627.4180
trowe@tresslerllp.com

More Related Content

What's hot

A10 presentation overcoming the industrys insecurity complex
A10 presentation   overcoming the industrys insecurity complexA10 presentation   overcoming the industrys insecurity complex
A10 presentation overcoming the industrys insecurity complexDr. Wilfred Lin (Ph.D.)
 
Security and the cloud
Security and the cloudSecurity and the cloud
Security and the cloudFREVVO
 
eFolder webinar — Ransomware to Recovery: How One Partner Saved His Clients w...
eFolder webinar — Ransomware to Recovery: How One Partner Saved His Clients w...eFolder webinar — Ransomware to Recovery: How One Partner Saved His Clients w...
eFolder webinar — Ransomware to Recovery: How One Partner Saved His Clients w...eFolder
 
Motor City West Presentation - Kimberlin Cranford, Acxiom Corporation
Motor City West Presentation - Kimberlin Cranford, Acxiom CorporationMotor City West Presentation - Kimberlin Cranford, Acxiom Corporation
Motor City West Presentation - Kimberlin Cranford, Acxiom CorporationthinkLA
 
How to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security LiteracyHow to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security LiteracyTripwire
 
Your clouds must be transparent - an intro to Cloud Security Alliance
Your clouds must be transparent - an intro to Cloud Security AllianceYour clouds must be transparent - an intro to Cloud Security Alliance
Your clouds must be transparent - an intro to Cloud Security AllianceDavid Jones
 
Ethics and technologies - Cybersecurity landscape
Ethics and technologies - Cybersecurity landscapeEthics and technologies - Cybersecurity landscape
Ethics and technologies - Cybersecurity landscapeRoman Trukhin
 
Business Law & Order - Privacy - June 17, 2013
Business Law & Order - Privacy - June 17, 2013Business Law & Order - Privacy - June 17, 2013
Business Law & Order - Privacy - June 17, 2013AnnArborSPARK
 
MHF-joins-VIMRO-Press-Release-FINAL3
MHF-joins-VIMRO-Press-Release-FINAL3MHF-joins-VIMRO-Press-Release-FINAL3
MHF-joins-VIMRO-Press-Release-FINAL3FitCEO, Inc. (FCI)
 
Garantice la continuidad de su negocio Damian Prieto
Garantice la continuidad de su negocio   Damian PrietoGarantice la continuidad de su negocio   Damian Prieto
Garantice la continuidad de su negocio Damian PrietoCristian Garcia G.
 

What's hot (10)

A10 presentation overcoming the industrys insecurity complex
A10 presentation   overcoming the industrys insecurity complexA10 presentation   overcoming the industrys insecurity complex
A10 presentation overcoming the industrys insecurity complex
 
Security and the cloud
Security and the cloudSecurity and the cloud
Security and the cloud
 
eFolder webinar — Ransomware to Recovery: How One Partner Saved His Clients w...
eFolder webinar — Ransomware to Recovery: How One Partner Saved His Clients w...eFolder webinar — Ransomware to Recovery: How One Partner Saved His Clients w...
eFolder webinar — Ransomware to Recovery: How One Partner Saved His Clients w...
 
Motor City West Presentation - Kimberlin Cranford, Acxiom Corporation
Motor City West Presentation - Kimberlin Cranford, Acxiom CorporationMotor City West Presentation - Kimberlin Cranford, Acxiom Corporation
Motor City West Presentation - Kimberlin Cranford, Acxiom Corporation
 
How to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security LiteracyHow to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security Literacy
 
Your clouds must be transparent - an intro to Cloud Security Alliance
Your clouds must be transparent - an intro to Cloud Security AllianceYour clouds must be transparent - an intro to Cloud Security Alliance
Your clouds must be transparent - an intro to Cloud Security Alliance
 
Ethics and technologies - Cybersecurity landscape
Ethics and technologies - Cybersecurity landscapeEthics and technologies - Cybersecurity landscape
Ethics and technologies - Cybersecurity landscape
 
Business Law & Order - Privacy - June 17, 2013
Business Law & Order - Privacy - June 17, 2013Business Law & Order - Privacy - June 17, 2013
Business Law & Order - Privacy - June 17, 2013
 
MHF-joins-VIMRO-Press-Release-FINAL3
MHF-joins-VIMRO-Press-Release-FINAL3MHF-joins-VIMRO-Press-Release-FINAL3
MHF-joins-VIMRO-Press-Release-FINAL3
 
Garantice la continuidad de su negocio Damian Prieto
Garantice la continuidad de su negocio   Damian PrietoGarantice la continuidad de su negocio   Damian Prieto
Garantice la continuidad de su negocio Damian Prieto
 

Viewers also liked

Executive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarExecutive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarFERMA
 
The Internet of Things: P&C Carriers & the Power of Digital
The Internet of Things: P&C Carriers & the Power of DigitalThe Internet of Things: P&C Carriers & the Power of Digital
The Internet of Things: P&C Carriers & the Power of DigitalCognizant
 
Halvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT securityIoT613
 
Designing for IoT and Cyber-Physical System
Designing for IoT and Cyber-Physical SystemDesigning for IoT and Cyber-Physical System
Designing for IoT and Cyber-Physical SystemMaurizio Caporali
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaDinesh O Bareja
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
One hour cyber july 2013
One hour cyber july 2013One hour cyber july 2013
One hour cyber july 2013Dan Michaluk
 
IoT and Insurance - Insurance breakfast
IoT and Insurance - Insurance breakfastIoT and Insurance - Insurance breakfast
IoT and Insurance - Insurance breakfastComarch
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
CPA firm Cyber Insurance Specifics
CPA firm Cyber Insurance SpecificsCPA firm Cyber Insurance Specifics
CPA firm Cyber Insurance SpecificsJoseph Brunsman
 
The Insurance of Things - How IoT Will Disrupt The Insurance Industry
The Insurance of Things - How IoT Will Disrupt The Insurance IndustryThe Insurance of Things - How IoT Will Disrupt The Insurance Industry
The Insurance of Things - How IoT Will Disrupt The Insurance IndustryAtooma Inc
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationEric Reehl
 
Optimizing the Internet of Things: Key Strategies for Commercial Insurers
Optimizing the Internet of Things: Key Strategies for Commercial InsurersOptimizing the Internet of Things: Key Strategies for Commercial Insurers
Optimizing the Internet of Things: Key Strategies for Commercial InsurersCognizant
 
IoT: Disruption and Opportunity in the Insurance Industry
IoT: Disruption and Opportunity in the Insurance IndustryIoT: Disruption and Opportunity in the Insurance Industry
IoT: Disruption and Opportunity in the Insurance IndustryNTT DATA Consulting, Inc.
 
Fifty Features of Java EE 7 in 50 Minutes
Fifty Features of Java EE 7 in 50 MinutesFifty Features of Java EE 7 in 50 Minutes
Fifty Features of Java EE 7 in 50 Minutesglassfish
 

Viewers also liked (17)

Executive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarExecutive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk Webinar
 
ACAM webinar presentation final v4
ACAM webinar presentation final v4ACAM webinar presentation final v4
ACAM webinar presentation final v4
 
The Internet of Things: P&C Carriers & the Power of Digital
The Internet of Things: P&C Carriers & the Power of DigitalThe Internet of Things: P&C Carriers & the Power of Digital
The Internet of Things: P&C Carriers & the Power of Digital
 
Halvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber Webinar
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
 
Designing for IoT and Cyber-Physical System
Designing for IoT and Cyber-Physical SystemDesigning for IoT and Cyber-Physical System
Designing for IoT and Cyber-Physical System
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
 
One hour cyber july 2013
One hour cyber july 2013One hour cyber july 2013
One hour cyber july 2013
 
IoT and Insurance - Insurance breakfast
IoT and Insurance - Insurance breakfastIoT and Insurance - Insurance breakfast
IoT and Insurance - Insurance breakfast
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
CPA firm Cyber Insurance Specifics
CPA firm Cyber Insurance SpecificsCPA firm Cyber Insurance Specifics
CPA firm Cyber Insurance Specifics
 
The Insurance of Things - How IoT Will Disrupt The Insurance Industry
The Insurance of Things - How IoT Will Disrupt The Insurance IndustryThe Insurance of Things - How IoT Will Disrupt The Insurance Industry
The Insurance of Things - How IoT Will Disrupt The Insurance Industry
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and Preparation
 
Optimizing the Internet of Things: Key Strategies for Commercial Insurers
Optimizing the Internet of Things: Key Strategies for Commercial InsurersOptimizing the Internet of Things: Key Strategies for Commercial Insurers
Optimizing the Internet of Things: Key Strategies for Commercial Insurers
 
IoT: Disruption and Opportunity in the Insurance Industry
IoT: Disruption and Opportunity in the Insurance IndustryIoT: Disruption and Opportunity in the Insurance Industry
IoT: Disruption and Opportunity in the Insurance Industry
 
Fifty Features of Java EE 7 in 50 Minutes
Fifty Features of Java EE 7 in 50 MinutesFifty Features of Java EE 7 in 50 Minutes
Fifty Features of Java EE 7 in 50 Minutes
 

Similar to CPSU Presentation

March 10 Cyber Presentation
March 10 Cyber PresentationMarch 10 Cyber Presentation
March 10 Cyber PresentationTodd Rowe
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan
 
Social media risks - data leakage and data accountability
Social media risks - data leakage and data accountabilitySocial media risks - data leakage and data accountability
Social media risks - data leakage and data accountabilityArrka Consulting
 
Social media data leakage and data accountability risks
Social media   data leakage and data accountability risksSocial media   data leakage and data accountability risks
Social media data leakage and data accountability risksArrka Consulting
 
RC_GREENBERG_Ofac enforcement compliance_ReprintFeb14
RC_GREENBERG_Ofac enforcement  compliance_ReprintFeb14RC_GREENBERG_Ofac enforcement  compliance_ReprintFeb14
RC_GREENBERG_Ofac enforcement compliance_ReprintFeb14Kara Bombach
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance RecommendationsMeg Weber
 
2016 Global data valuation survey
2016 Global data valuation survey2016 Global data valuation survey
2016 Global data valuation surveyBrunswick Group
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Logikcull.com
 
Cybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm DataCybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm DataRocket Matter, LLC
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Shawn Tuma
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Jay Kesan
 
Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Graeme Cross
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber InsuranceJohn Ryan
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Shawn Tuma
 
Third party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligenceThird party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligenceCharles Steve
 
Privacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 PredictionsPrivacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 PredictionsResilient Systems
 
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...Amazon Web Services
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Don Grauel
 
Crisis project (1)
Crisis project (1)Crisis project (1)
Crisis project (1)jie he
 

Similar to CPSU Presentation (20)

March 10 Cyber Presentation
March 10 Cyber PresentationMarch 10 Cyber Presentation
March 10 Cyber Presentation
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
 
Social media risks - data leakage and data accountability
Social media risks - data leakage and data accountabilitySocial media risks - data leakage and data accountability
Social media risks - data leakage and data accountability
 
Social media data leakage and data accountability risks
Social media   data leakage and data accountability risksSocial media   data leakage and data accountability risks
Social media data leakage and data accountability risks
 
RC_GREENBERG_Ofac enforcement compliance_ReprintFeb14
RC_GREENBERG_Ofac enforcement  compliance_ReprintFeb14RC_GREENBERG_Ofac enforcement  compliance_ReprintFeb14
RC_GREENBERG_Ofac enforcement compliance_ReprintFeb14
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance Recommendations
 
2016 Global data valuation survey
2016 Global data valuation survey2016 Global data valuation survey
2016 Global data valuation survey
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
 
Cybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm DataCybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm Data
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
 
Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
 
Third party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligenceThird party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligence
 
Privacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 PredictionsPrivacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 Predictions
 
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Crisis project (1)
Crisis project (1)Crisis project (1)
Crisis project (1)
 

CPSU Presentation

  • 1. © 2014 Tressler LLP Presented by: Todd M. Rowe Cyber Insurance Underwriters: Your Country Needs You April 13, 2016
  • 2. © 2014 Tressler LLP No Longer A Safe Harbor For Cyber Security » Insurance Agreement » Exclusions » Portal Health Decision Further Reading: April 12, 2016 Privacy Risk Report. CGL Insurance Issues 2
  • 3. © 2014 Tressler LLP Emerging Issue For 2016: Claims Related To The “Internet of Things” For Further Reading: January 27, 2016 Privacy Risk Report First Party Property Insurance Issues 3
  • 4. © 2014 Tressler LLP Questions » Does the company have a cyber- incident response plan? » Are subcontractors and suppliers evaluated to ensure their adherence to the company’s cyber requirements? » Does the firm engage in basic cyber hygiene, such as the regular patching of software and scanning for malicious activity, and mandating a multi-step identity check to access company networks? “Your Country Needs You” 4 Further Reading: September 11, 2015 Privacy Risk Report
  • 5. © 2014 Tressler LLP » D & O Underwriters Struggle With The Lack Of Information Related To Cyber Risks. November 14, 2014 Privacy Risk Report » Early Observations Concerning The Sony Hack And Cyberliability Insurance. › “The strength of this insurance will start with the underwriting process.” January 8, 2015 Privacy Risk Report Privacy Risk Report Posts For Underwriters 5
  • 6. © 2014 Tressler LLP Tort Source Fall 2015 Handout Columbia Casualty Co. v. Cottage Health System, 2:15- cv-3432 (C.D. Cal. 2015) The Current State Of Cyber Insurance Law 6
  • 7. © 2014 Tressler LLP “Think of a massive cyber- attack as an intelligent hurricane…If it hits a house that doesn’t fall down it learns why the house didn’t fall and it changes.” Data Breach/Cyber Security Parting Note 7
  • 8. © 2014 Tressler LLP Another Parting Note 8
  • 9. Thank you. © 2014 Tressler LLP www.privacyriskreport.com Todd M. Rowe 312.627.4180 trowe@tresslerllp.com