SlideShare a Scribd company logo
1 of 24
Download to read offline
Accounting for Cyber Risks
How much does Cyber actually cost the Industry?
Jef Lacson
CPA, CISA, CIA, CLSSGB
Senior Vice President
Chief Financial Officer
AIG Insurance (Philippines, Guam & Micronesia)
Jef.Lacson@aig.com
HIGHLY CONFIDENTIAL – DO NOT COPY
§ Cyber
§ Cyber in Insurance
§ Cyber Risk
§ Cyber Risk Insurance
§ Accounting for Cyber
Contents
HIGHLY CONFIDENTIAL – DO NOT COPY
Cyber
2018, www.merriam-webster.com
HIGHLY CONFIDENTIAL – DO NOT COPY
Insurance2.5
Insurance2.0
Insurance3.0
Insurance1.0
Analog
Insurance
Companies
• manual entry
• stacks of
paperwork
• effective and
lean processes
IT-Enhanced
Insurance
• e-commerce
• online quote-
and-bind,
• paperless billing,
• automated
underwriting,
• self-service
capabilities,
• high- touch
claims process.
• insurance to
smart- phones
Forays into
Digital
• predictive
behavioral
analytics
• market
intelligence
• drones, aerial
pictometry and
advanced
cartographic
• onboard devices
• insurance on
demand
• Social insurance
• mobility services
Digital
Insurance
Platforms
and
Products
• customer centric
• disrupters
• adaptive
• agile
Cyber in Insurance
The Digital Evolution
2015, The Insurance Industry as s Digital Business (NTT Innovation Institute, Inc)
HIGHLY CONFIDENTIAL – DO NOT COPY
Digital Revolution – path to higher revenues and lower costs
Potential savings from digitalization of prototypical German P&C Insurer
2017, Digitalization in Insurance: The Multibillion Dollar Opportunity (Bain & Company; Google)
HIGHLY CONFIDENTIAL – DO NOT COPY
“Any risks that emanate from the use of electronic data and its transmission,
including technology tools such as the internet and telecommunications
networks.
It also encompasses physical damage that can be caused by cybersecurity
incidents, fraud committed by misuse of data, any liability arising from data
storage, and the availability, integrity and confidentiality of electronic information
− be it related to individuals, companies, or governments.”
Cyber Risk
2014, The Cyber Risk Challenge and the Role of Insurance (CRO Forum)
HIGHLY CONFIDENTIAL – DO NOT COPY
Top Global Risk
2017, Insurance Banana Skins survey (CSFI/PWC)
2017 Top Global Risk According (Insurance Banana Skin Survey - CSFI/PwC)
2018's Most Dangerous Risks for Insurers (Willis Towers Watson)
2018’s Top Operational Risks (risk.net)
HIGHLY CONFIDENTIAL – DO NOT COPY
A bigger threat than regulation
2017, Insurance Banana Skins survey (CSFI/PWC)
HIGHLY CONFIDENTIAL – DO NOT COPY
Use of Automation
and Artificial
Intelligence in
Insurance
Insurance
Distribution Is Being
Redefined
Changing Market
Dynamics due to
Value Chain
Disaggregation
New Products for the
Sharing Economy
Increasing Use of
Digital and Mobile for
Risk Management
Better Customer
Experience
Use of Analytics for
Improved Profitability
and Customer
Experience
Greater Use of
Internet of Things
(IoT) for Building
Data and New
Models
Increasing Use of
Value-Added
Services
Blockchain to Enable
Streamlined
Insurance
Operations
Greater Use of
Augmented Reality
in Insurance
Industry Disruptors & Forces
2017, Top Insurance Trends (Cap Gemini)
HIGHLY CONFIDENTIAL – DO NOT COPY
Use of Automation
and Artificial
Intelligence in
Insurance
Insurance
Distribution Is Being
Redefined
Changing Market
Dynamics due to
Value Chain
Disaggregation
New Products for the
Sharing Economy
Increasing Use of
Digital and Mobile for
Risk Management
Better Customer
Experience
Use of Analytics for
Improved Profitability
and Customer
Experience
Greater Use of
Internet of Things
(IoT) for Building
Data and New
Models
Increasing Use of
Value-Added
Services
Blockchain to Enable
Streamlined
Insurance
Operations
Greater Use of
Augmented Reality
in Insurance
(In time horizon)
Present Near Future Future
Industry Disruptors & Forces
HIGHLY CONFIDENTIAL – DO NOT COPY
ACTOR
• Criminal
• Competition
• Government
• Terrorist
Vulnerability
• Flaws
• Weakness
Motivation
• Financial
• Political
• Publicity
Industry Vulnerabilities
THREATS
ASSETS
• IP
ü Risk Strategies
ü Sensitive
Proprietary
Information
• Personal
Identifiable
Information (PII)
• Client Data
Staff Data
IMPACT
• Fines;
• Legal fees,
• Lawsuits; and
• Fraud
monitoring
costs.
• Brand & market
value
Rapid
Digitization
Cybercriminals' Shifting
Targeting Strategies
Comparatively
Lax Regulatory
Landscape
HIGHLY CONFIDENTIAL – DO NOT COPY
Industry Compliance
APRA
Will check extent of Insurance
Industry preparedness to
Cyber attack in 2016
NAIC
Principles for Effective
Cybersecurity Insurance
Regulatory Guidance
Germany
The supervisory examination of the
management of cyber risk is usually
performed through on-site inspections
CBI
Increasing Focus on Cyber
Security Threat
European Cyber Law
NIS directive identifying operators of
essential services, including Financial
Industry
France
L’Autorité de Contrôle Prudentiel et de
Résolution (ACPR) categorises
supervision related to cyber risk under
Information System (IS) control
Netherlands
Benchmarking for cyber risk
management
Singapore
Industry-wide simulated
cyber incidents simulation
UK
CBEST tests and adopt
individual cyber resilience
action plans
HIGHLY CONFIDENTIAL – DO NOT COPY
Industry Incidents
2 American Health
Insurance Companies
• Credit Card & PII Breach
• 91m policy holder information
An American State
• Data Server Compromised
• Workers compensation
claimants
2 German Insurer
Group
• DD4BC – DDoS for BitCoin
• Company web servers
A French Insurer
• Internal penetration testing
• Unauthorized Access to
Accounting Tools
French mutual
insurance company
• Internal data theft
• Identity theft and false claims
Netherlands Insurer
• CEO Hack
• phishing cyber attack
London-based private
healthcare group
• Data Breach
HIGHLY CONFIDENTIAL – DO NOT COPY
Tip of the Ice Berge
2015, the New York State Department of Financial Services
Top Cyber Techniques in Insurance Sector
Malware
(58%)
Phishing
(33%)
Botnets
(33%)
Pharming
(25%)
Others
(33%)
Known
Incidents
Organizations want to
avoid losing face and
potential brand damage
Limited regulation mandating
publication of incidents
Undetected Breaches
HIGHLY CONFIDENTIAL – DO NOT COPY
Global Costs to Resolve Consequences of the Cyber Attack
2017, Accenture Cost of Cybercrime Study
HIGHLY CONFIDENTIAL – DO NOT COPY
Global Costs of Cyber Security
2018, Information security spending worldwide from 2016 to 2018 (www.statista.com)
+14%
+8%
HIGHLY CONFIDENTIAL – DO NOT COPY
Global Costs of Cyber Security
2015, Cyber Security For Business – Counting The Costs, Finding The Value
On-premise Cloud-based Outsourced
HIGHLY CONFIDENTIAL – DO NOT COPY
How do Insurers handle cyber incidents & losses?
2016, 19th Global Information Security Survey 2016-17 for Insurance Sector (EY)
61% of insurer say that it takes months
to detect successful security breaches
34% of insurer have proper cyber
incident escalation paths
Insurers’ internal security teams
discover only 66% of effective
breaches
“We have to assume we have already been breached”
Brian Krebs (Krebs on Security)
HIGHLY CONFIDENTIAL – DO NOT COPY
Perimeter defenses are consistently breached
2014, Cisco Talos, Deliotte Financial Advisory service, Deloitte & Touche LLP, Mandiant, RSA, Verizon RISK -
CyberArk Threat Report: Privileged Account Exploits Shift the front lines of Cyber Security, The New Cyber
Battleground, CyberArk
Over 28 Billion spent on IT security in 2014!!!
Over 90% of organizations breached
HIGHLY CONFIDENTIAL – DO NOT COPY
$400B
Annual Losses from Cyber Attack
Additional costs that are hard to
quantify: damage to company
reputation, erosion of consumer
confidence, immediate and future lost
sales as well as subsequent and
necessary security enhancements
$150B
Insurance
industry’s
global cyber
risk exposure
$2.5B
Cyber
insurance
premiums
$53B
Information
security
spending
Cyber Risk Insurance
2015, The role of insurance in managing and mitigating the risk (UK Government)
2014, Net Losses: Estimating the Global Cost of Cybercrime (Centre for Strategic and International Studies)
2015, Speech by John Nelson, Lloyd’s Chairman, at the AAMGA, (www.lloyds.com)
2018, Information security spending worldwide from 2016 to 2018 (www.statista.com)
Combined
Ratio
80%
HIGHLY CONFIDENTIAL – DO NOT COPY
Tip of the Ice Berge
2015, the New York State Department of Financial Services
Top Cyber Techniques in Insurance Sector
Malware
(58%)
Phishing
(33%)
Botnets
(33%)
Pharming
(25%)
Others
(33%)
Known
Incidents
Organizations want to
avoid losing face and
potential brand damage
Limited regulation mandating
publication of incidents
Undetected Breaches
HIGHLY CONFIDENTIAL – DO NOT COPY
How much does Cyber actually cost the Industry?
Income Expense
Savings from
Digitalization
Margin from
Cyber Insurance
Increase in
premiums
Cyber
Investments
Cyber Security
Expense
HIGHLY CONFIDENTIAL – DO NOT COPY
How much does Cyber actually cost the Industry?
Income Expense
Cyber
Investments
Cyber Security
Expense
Cyber Attack
Slow-burn Cost
Cyber Attack
Immediate Cost
Savings from
Digitalization
Margin from
Cyber Insurance
Increase in
premiums
HIGHLY CONFIDENTIAL – DO NOT COPY
American International Group, Inc. (AIG) is a leading global insurance organization. Founded in 1919, today AIG member companies provide a wide range of property casualty
insurance, life insurance, retirement products, and other financial services to customers in more than 80 countries and jurisdictions. These diverse offerings include products and
services that help businesses and individuals protect their assets, manage risks and provide for retirement security. AIG’s core businesses include Commercial Insurance and Consumer
Insurance, as well as Other Operations. Commercial Insurance comprises two modules – Liability and Financial Lines, and Property and Special Risks. Consumer Insurance comprises
four modules – Individual Retirement, Group Retirement, Life Insurance and Personal Insurance. AIG common stock is listed on the New York Stock Exchange and the Tokyo Stock
Exchange.
Additional information about AIG can be found at www.aig.com and www.aig.com/strategyupdate | YouTube: www.youtube.com/aig | Twitter: @AIGinsurance
www.twitter.com/AIGinsurance | LinkedIn: www.linkedin.com/company/aig. These references with additional information about AIG have been provided as a convenience, and the
information contained on such websites is not incorporated by reference into this press release.
AIG is the marketing name for the worldwide property-casualty, life and retirement, and general insurance operations of American International Group, Inc. For additional information,
please visit our website at www.aig.com. All products and services are written or provided by subsidiaries or affiliates of American International Group, Inc. Products or services may not
be available in all countries, and coverage is subject to actual policy language. Non-insurance products and services may be provided by independent third parties. Certain property-
casualty coverages may be provided by a surplus lines insurer. Surplus lines insurers do not generally participate in state guaranty funds, and insureds are therefore not protected by
such funds.

More Related Content

What's hot

IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignStephanie Holman
 
How Technology Impacts the Insurance Sector - Raymond Kairouz
How Technology Impacts the Insurance Sector - Raymond KairouzHow Technology Impacts the Insurance Sector - Raymond Kairouz
How Technology Impacts the Insurance Sector - Raymond Kairouzsigortatatbikatcilari
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesJeremiah Grossman
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Jeremiah Grossman
 
Future of Cyber-security Economy
Future of Cyber-security EconomyFuture of Cyber-security Economy
Future of Cyber-security EconomyBehnaz Aria
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Echoworx
 
Global Identity Fraud Report 2020
Global Identity Fraud Report 2020Global Identity Fraud Report 2020
Global Identity Fraud Report 2020Shufti Pro
 
Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2Felipe Prado
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecSoluciona Facil
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
LastPass 2021
LastPass 2021LastPass 2021
LastPass 2021Bruce Ma
 
WhiteHat Security 8th Website Security Statistics Report
WhiteHat Security 8th Website Security Statistics ReportWhiteHat Security 8th Website Security Statistics Report
WhiteHat Security 8th Website Security Statistics ReportJeremiah Grossman
 

What's hot (17)

IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
How Technology Impacts the Insurance Sector - Raymond Kairouz
How Technology Impacts the Insurance Sector - Raymond KairouzHow Technology Impacts the Insurance Sector - Raymond Kairouz
How Technology Impacts the Insurance Sector - Raymond Kairouz
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security Guarantees
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
 
Future of Cyber-security Economy
Future of Cyber-security EconomyFuture of Cyber-security Economy
Future of Cyber-security Economy
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 
Global Identity Fraud Report 2020
Global Identity Fraud Report 2020Global Identity Fraud Report 2020
Global Identity Fraud Report 2020
 
Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantec
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
LastPass 2021
LastPass 2021LastPass 2021
LastPass 2021
 
The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018
 
WhiteHat Security 8th Website Security Statistics Report
WhiteHat Security 8th Website Security Statistics ReportWhiteHat Security 8th Website Security Statistics Report
WhiteHat Security 8th Website Security Statistics Report
 

Similar to Accounting for Cyber Risks - How much does Cyber actually cost the Industry?

Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecCybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecRapidSSLOnline.com
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...Matthew Rosenquist
 
Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Graeme Cross
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Molly Alexander
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021Management Events
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Team Finland Future Watch
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
The Singapore FinTech Consortium - Introduction to InsurTech
The Singapore FinTech Consortium - Introduction to InsurTechThe Singapore FinTech Consortium - Introduction to InsurTech
The Singapore FinTech Consortium - Introduction to InsurTechFinTech Consortium
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewMorgan Jones
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomIBM Security
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurityMark Albala
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 

Similar to Accounting for Cyber Risks - How much does Cyber actually cost the Industry? (20)

Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecCybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
 
Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
The Singapore FinTech Consortium - Introduction to InsurTech
The Singapore FinTech Consortium - Introduction to InsurTechThe Singapore FinTech Consortium - Introduction to InsurTech
The Singapore FinTech Consortium - Introduction to InsurTech
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual review
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 

More from Jef Lacson

THE IMPACT OF INSURTECH APPLICATIONS ON PHILIPPINES' NON LIFE INSURANCE SECTO...
THE IMPACT OF INSURTECH APPLICATIONS ON PHILIPPINES' NON LIFE INSURANCE SECTO...THE IMPACT OF INSURTECH APPLICATIONS ON PHILIPPINES' NON LIFE INSURANCE SECTO...
THE IMPACT OF INSURTECH APPLICATIONS ON PHILIPPINES' NON LIFE INSURANCE SECTO...Jef Lacson
 
Clockwise - focusing on your timeline
Clockwise - focusing on your timelineClockwise - focusing on your timeline
Clockwise - focusing on your timelineJef Lacson
 
Building and optimizing your audit teamv2
Building and optimizing your audit teamv2Building and optimizing your audit teamv2
Building and optimizing your audit teamv2Jef Lacson
 
Hot joe 24-online
Hot joe 24-onlineHot joe 24-online
Hot joe 24-onlineJef Lacson
 
Hot joe 24-online excerpt
Hot joe 24-online excerptHot joe 24-online excerpt
Hot joe 24-online excerptJef Lacson
 

More from Jef Lacson (6)

THE IMPACT OF INSURTECH APPLICATIONS ON PHILIPPINES' NON LIFE INSURANCE SECTO...
THE IMPACT OF INSURTECH APPLICATIONS ON PHILIPPINES' NON LIFE INSURANCE SECTO...THE IMPACT OF INSURTECH APPLICATIONS ON PHILIPPINES' NON LIFE INSURANCE SECTO...
THE IMPACT OF INSURTECH APPLICATIONS ON PHILIPPINES' NON LIFE INSURANCE SECTO...
 
Life of A CFO
Life of A CFOLife of A CFO
Life of A CFO
 
Clockwise - focusing on your timeline
Clockwise - focusing on your timelineClockwise - focusing on your timeline
Clockwise - focusing on your timeline
 
Building and optimizing your audit teamv2
Building and optimizing your audit teamv2Building and optimizing your audit teamv2
Building and optimizing your audit teamv2
 
Hot joe 24-online
Hot joe 24-onlineHot joe 24-online
Hot joe 24-online
 
Hot joe 24-online excerpt
Hot joe 24-online excerptHot joe 24-online excerpt
Hot joe 24-online excerpt
 

Recently uploaded

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 

Recently uploaded (20)

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 

Accounting for Cyber Risks - How much does Cyber actually cost the Industry?

  • 1. Accounting for Cyber Risks How much does Cyber actually cost the Industry? Jef Lacson CPA, CISA, CIA, CLSSGB Senior Vice President Chief Financial Officer AIG Insurance (Philippines, Guam & Micronesia) Jef.Lacson@aig.com
  • 2. HIGHLY CONFIDENTIAL – DO NOT COPY § Cyber § Cyber in Insurance § Cyber Risk § Cyber Risk Insurance § Accounting for Cyber Contents
  • 3. HIGHLY CONFIDENTIAL – DO NOT COPY Cyber 2018, www.merriam-webster.com
  • 4. HIGHLY CONFIDENTIAL – DO NOT COPY Insurance2.5 Insurance2.0 Insurance3.0 Insurance1.0 Analog Insurance Companies • manual entry • stacks of paperwork • effective and lean processes IT-Enhanced Insurance • e-commerce • online quote- and-bind, • paperless billing, • automated underwriting, • self-service capabilities, • high- touch claims process. • insurance to smart- phones Forays into Digital • predictive behavioral analytics • market intelligence • drones, aerial pictometry and advanced cartographic • onboard devices • insurance on demand • Social insurance • mobility services Digital Insurance Platforms and Products • customer centric • disrupters • adaptive • agile Cyber in Insurance The Digital Evolution 2015, The Insurance Industry as s Digital Business (NTT Innovation Institute, Inc)
  • 5. HIGHLY CONFIDENTIAL – DO NOT COPY Digital Revolution – path to higher revenues and lower costs Potential savings from digitalization of prototypical German P&C Insurer 2017, Digitalization in Insurance: The Multibillion Dollar Opportunity (Bain & Company; Google)
  • 6. HIGHLY CONFIDENTIAL – DO NOT COPY “Any risks that emanate from the use of electronic data and its transmission, including technology tools such as the internet and telecommunications networks. It also encompasses physical damage that can be caused by cybersecurity incidents, fraud committed by misuse of data, any liability arising from data storage, and the availability, integrity and confidentiality of electronic information − be it related to individuals, companies, or governments.” Cyber Risk 2014, The Cyber Risk Challenge and the Role of Insurance (CRO Forum)
  • 7. HIGHLY CONFIDENTIAL – DO NOT COPY Top Global Risk 2017, Insurance Banana Skins survey (CSFI/PWC) 2017 Top Global Risk According (Insurance Banana Skin Survey - CSFI/PwC) 2018's Most Dangerous Risks for Insurers (Willis Towers Watson) 2018’s Top Operational Risks (risk.net)
  • 8. HIGHLY CONFIDENTIAL – DO NOT COPY A bigger threat than regulation 2017, Insurance Banana Skins survey (CSFI/PWC)
  • 9. HIGHLY CONFIDENTIAL – DO NOT COPY Use of Automation and Artificial Intelligence in Insurance Insurance Distribution Is Being Redefined Changing Market Dynamics due to Value Chain Disaggregation New Products for the Sharing Economy Increasing Use of Digital and Mobile for Risk Management Better Customer Experience Use of Analytics for Improved Profitability and Customer Experience Greater Use of Internet of Things (IoT) for Building Data and New Models Increasing Use of Value-Added Services Blockchain to Enable Streamlined Insurance Operations Greater Use of Augmented Reality in Insurance Industry Disruptors & Forces 2017, Top Insurance Trends (Cap Gemini)
  • 10. HIGHLY CONFIDENTIAL – DO NOT COPY Use of Automation and Artificial Intelligence in Insurance Insurance Distribution Is Being Redefined Changing Market Dynamics due to Value Chain Disaggregation New Products for the Sharing Economy Increasing Use of Digital and Mobile for Risk Management Better Customer Experience Use of Analytics for Improved Profitability and Customer Experience Greater Use of Internet of Things (IoT) for Building Data and New Models Increasing Use of Value-Added Services Blockchain to Enable Streamlined Insurance Operations Greater Use of Augmented Reality in Insurance (In time horizon) Present Near Future Future Industry Disruptors & Forces
  • 11. HIGHLY CONFIDENTIAL – DO NOT COPY ACTOR • Criminal • Competition • Government • Terrorist Vulnerability • Flaws • Weakness Motivation • Financial • Political • Publicity Industry Vulnerabilities THREATS ASSETS • IP ü Risk Strategies ü Sensitive Proprietary Information • Personal Identifiable Information (PII) • Client Data Staff Data IMPACT • Fines; • Legal fees, • Lawsuits; and • Fraud monitoring costs. • Brand & market value Rapid Digitization Cybercriminals' Shifting Targeting Strategies Comparatively Lax Regulatory Landscape
  • 12. HIGHLY CONFIDENTIAL – DO NOT COPY Industry Compliance APRA Will check extent of Insurance Industry preparedness to Cyber attack in 2016 NAIC Principles for Effective Cybersecurity Insurance Regulatory Guidance Germany The supervisory examination of the management of cyber risk is usually performed through on-site inspections CBI Increasing Focus on Cyber Security Threat European Cyber Law NIS directive identifying operators of essential services, including Financial Industry France L’Autorité de Contrôle Prudentiel et de Résolution (ACPR) categorises supervision related to cyber risk under Information System (IS) control Netherlands Benchmarking for cyber risk management Singapore Industry-wide simulated cyber incidents simulation UK CBEST tests and adopt individual cyber resilience action plans
  • 13. HIGHLY CONFIDENTIAL – DO NOT COPY Industry Incidents 2 American Health Insurance Companies • Credit Card & PII Breach • 91m policy holder information An American State • Data Server Compromised • Workers compensation claimants 2 German Insurer Group • DD4BC – DDoS for BitCoin • Company web servers A French Insurer • Internal penetration testing • Unauthorized Access to Accounting Tools French mutual insurance company • Internal data theft • Identity theft and false claims Netherlands Insurer • CEO Hack • phishing cyber attack London-based private healthcare group • Data Breach
  • 14. HIGHLY CONFIDENTIAL – DO NOT COPY Tip of the Ice Berge 2015, the New York State Department of Financial Services Top Cyber Techniques in Insurance Sector Malware (58%) Phishing (33%) Botnets (33%) Pharming (25%) Others (33%) Known Incidents Organizations want to avoid losing face and potential brand damage Limited regulation mandating publication of incidents Undetected Breaches
  • 15. HIGHLY CONFIDENTIAL – DO NOT COPY Global Costs to Resolve Consequences of the Cyber Attack 2017, Accenture Cost of Cybercrime Study
  • 16. HIGHLY CONFIDENTIAL – DO NOT COPY Global Costs of Cyber Security 2018, Information security spending worldwide from 2016 to 2018 (www.statista.com) +14% +8%
  • 17. HIGHLY CONFIDENTIAL – DO NOT COPY Global Costs of Cyber Security 2015, Cyber Security For Business – Counting The Costs, Finding The Value On-premise Cloud-based Outsourced
  • 18. HIGHLY CONFIDENTIAL – DO NOT COPY How do Insurers handle cyber incidents & losses? 2016, 19th Global Information Security Survey 2016-17 for Insurance Sector (EY) 61% of insurer say that it takes months to detect successful security breaches 34% of insurer have proper cyber incident escalation paths Insurers’ internal security teams discover only 66% of effective breaches “We have to assume we have already been breached” Brian Krebs (Krebs on Security)
  • 19. HIGHLY CONFIDENTIAL – DO NOT COPY Perimeter defenses are consistently breached 2014, Cisco Talos, Deliotte Financial Advisory service, Deloitte & Touche LLP, Mandiant, RSA, Verizon RISK - CyberArk Threat Report: Privileged Account Exploits Shift the front lines of Cyber Security, The New Cyber Battleground, CyberArk Over 28 Billion spent on IT security in 2014!!! Over 90% of organizations breached
  • 20. HIGHLY CONFIDENTIAL – DO NOT COPY $400B Annual Losses from Cyber Attack Additional costs that are hard to quantify: damage to company reputation, erosion of consumer confidence, immediate and future lost sales as well as subsequent and necessary security enhancements $150B Insurance industry’s global cyber risk exposure $2.5B Cyber insurance premiums $53B Information security spending Cyber Risk Insurance 2015, The role of insurance in managing and mitigating the risk (UK Government) 2014, Net Losses: Estimating the Global Cost of Cybercrime (Centre for Strategic and International Studies) 2015, Speech by John Nelson, Lloyd’s Chairman, at the AAMGA, (www.lloyds.com) 2018, Information security spending worldwide from 2016 to 2018 (www.statista.com) Combined Ratio 80%
  • 21. HIGHLY CONFIDENTIAL – DO NOT COPY Tip of the Ice Berge 2015, the New York State Department of Financial Services Top Cyber Techniques in Insurance Sector Malware (58%) Phishing (33%) Botnets (33%) Pharming (25%) Others (33%) Known Incidents Organizations want to avoid losing face and potential brand damage Limited regulation mandating publication of incidents Undetected Breaches
  • 22. HIGHLY CONFIDENTIAL – DO NOT COPY How much does Cyber actually cost the Industry? Income Expense Savings from Digitalization Margin from Cyber Insurance Increase in premiums Cyber Investments Cyber Security Expense
  • 23. HIGHLY CONFIDENTIAL – DO NOT COPY How much does Cyber actually cost the Industry? Income Expense Cyber Investments Cyber Security Expense Cyber Attack Slow-burn Cost Cyber Attack Immediate Cost Savings from Digitalization Margin from Cyber Insurance Increase in premiums
  • 24. HIGHLY CONFIDENTIAL – DO NOT COPY American International Group, Inc. (AIG) is a leading global insurance organization. Founded in 1919, today AIG member companies provide a wide range of property casualty insurance, life insurance, retirement products, and other financial services to customers in more than 80 countries and jurisdictions. These diverse offerings include products and services that help businesses and individuals protect their assets, manage risks and provide for retirement security. AIG’s core businesses include Commercial Insurance and Consumer Insurance, as well as Other Operations. Commercial Insurance comprises two modules – Liability and Financial Lines, and Property and Special Risks. Consumer Insurance comprises four modules – Individual Retirement, Group Retirement, Life Insurance and Personal Insurance. AIG common stock is listed on the New York Stock Exchange and the Tokyo Stock Exchange. Additional information about AIG can be found at www.aig.com and www.aig.com/strategyupdate | YouTube: www.youtube.com/aig | Twitter: @AIGinsurance www.twitter.com/AIGinsurance | LinkedIn: www.linkedin.com/company/aig. These references with additional information about AIG have been provided as a convenience, and the information contained on such websites is not incorporated by reference into this press release. AIG is the marketing name for the worldwide property-casualty, life and retirement, and general insurance operations of American International Group, Inc. For additional information, please visit our website at www.aig.com. All products and services are written or provided by subsidiaries or affiliates of American International Group, Inc. Products or services may not be available in all countries, and coverage is subject to actual policy language. Non-insurance products and services may be provided by independent third parties. Certain property- casualty coverages may be provided by a surplus lines insurer. Surplus lines insurers do not generally participate in state guaranty funds, and insureds are therefore not protected by such funds.