SlideShare a Scribd company logo
1 of 30
Download to read offline
CYBER LIABILITY
INSURANCE
KoushikACII
 What is Cyber Risk ??
 Types of Damages
 How are industries exposed to this risk ?
 Common Misconceptions in Cyber Risk
 Cyber Liability Exposures
 Cyber Risk Impact ( Energy Sector )
 Insurable Cyber Risks
 Pricing & UW Considerations
 Managing Cyber Risks
OUR DISCUSSION TODAY
Cyber Risk
• any risk of financial loss, disruption
or damage to the reputation of an
organisation from some sort of failure
of its information technology
systems (includes networks & the
internet).
Non-Physical Damage
• Data Corruption
• Theft of Intellectual property
• Financial DataTheft
• Extortion
Physical Damage
• Infection of software
• Manipulation / overriding system controls
• Operations disruption
Types of Damages
2Types of companies
• Companies who have had a security breach
• Companies who don’t Know that they have had a breach
ALL COMPANIES HAVE CYBER RISK
“We have a 3rd Party Payment process , so we have transferred our
exposure “
Even if a breach happens with payment processor, Primary company
will be still held liable under privacy laws
We have upgraded our security by transferring our data to a cloud
provider “
Cloud Service providers are the best opportunity for hackers , And
guess what the data handled by them isYOUR CUSTOMER DATA
ANDTHEFT OFTHAT DATA IS GOINTO PUTYOU INTROUBLE
Common Misconceptions
Cyber Liability Exposures
Market Disruption
• Hacking into company data on reserves – cause industry wide impact
• Commodity pricing
Physical Damage
• Attack on dams – Massive PD & compromise water supply
• Gaining control of wind turbine – damage of equipment
IMPLICATIONS ON ENERGY SECTOR
Human Harm
• Hacking a Nuclear plant – Core meltdown – radioactive
catastrophe – Another Chernobyl !!!!
• Infiltration of Electric grid – Result in mass black-out
Financial Loss
• Business interruption / CBI
• DataTheft
• Liability of power producers towards manufactures
• Regulatory Fines
WHY ENERGY ??
Economic & physical
consequences of cyber attack on
energy could be
SEVERE !!
2015, Ukraine , Power Grid
• Hack on 3 distribution companies
• Affected 80,000 Energy Customers
2012, SAUDIARABIA , ARAMCO
• 30,000 Computers affected because of virus ( SHAMOON)
• Systems offline for 10 Days, 85 % of company's hardware
destroyed
2003, Ohio Nuclear Plant
• Slammer fastest worm in history disabled safety monitoring
systems for 5 Hrs
List of Past Cyber Attacks
Theft:
• Identity theft
• Theft of digital assets
Business interruption
• Lost Income
• Recovery of damaged data records
• Reputational damage
• Cost of Credit Monitoring of impacted clients
Key Insurable Cyber Risks
Pricing Cyber Risk
Strength of Security System
Likelihood of intrusion
Risk Management Culture
Control in place & role of compliance & audit
Frequency Severity
Disaster Recovery
Ability to recover from attack
Rating of Service Providers
Reliability of cloud providers, backup providers, website, etc
Legal Fees & Fines
IT Staff Costs
Data restoration
PR & Marketing Costs
Extortion
Customer Support
Lost Income
Policy Terms
Legal Liability
Not complying with privacy laws
Crisis Management Costs
Informing customers, public relations & adverts
Data Extortion
Ransom Payment
First Party Risks Third Party Risks
Loss of Income
As a result of network failure & downtime
Data Recovery
IT Staff overtime, data retrieval & verification
Security Liability
Liability arising from breach of security
Multimedia Liability
Liability arising from insured’s internet, advertising &
marketing activities
Professional Liability
Liability arising out of negligence in providing IT Services
Business
• Type of business
• Size of business
• Scope of the business
Number of customers
Multimedia
• Presence on theWeb
• Data collected and stored
Enterprise Risk Management (ERM) techniques applied by the
business to protect its computer network and its assets.
• Risk management procedure & culture
UW Considerations
Cyber Crime – Global Costs -
Sources: 1 World Bank (2013) 2Net Losses: Estimating the Global Cost of Cyber-Crime,
CSIS/McAfee 3Allianz Global Corporate & Specialty
Respondents by region
Reasons for buying cyber insurance
Greatest concern for cyber risk purchase
( Rated in scale of 1-5)
Coverage requirement for new cyber insurance buyers
Top Factors for influencing Cyber insurance
Policies in which Cyber Extension is given
through endorsement
Challenges in Selling Cyber
Risk Identification / proposal Form
Potential Risk Event Likelihood
Potential
Impact
Website copyright/trademark infringement claims
Legal liability to others for computer security breaches
(non-privacy)
Legal liability to others for privacy breaches
Privacy breach notification costs & credit monitoring
Privacy regulatory action defense and fines
Costs to repair damage to your information assets
Loss of revenue due to a failure of security or computer
attack
Loss of revenue due to a failure of security at a dependent
technology provider
Cyber Extortion Threat
• Cyber risk is an emerging risk in the world
• Cyber risk is no-longer an IT issue, it is a Board Level issue
• Increasing Interconnection & Digitization
• Technology vendors play a critical role
• Cyber insurance is one mechanism of risk transfer
Conclusions
In the end
everything is
D&O liability !!
Key Statistics & sources of information
• Key Statistics- Source Advisen Ltd – Partner re Publication Oct 2016
• Aon Cyber Survey 2016
• Marsh Global economic Forum – Energy Risk Cyber Article
• Allianz Cyber risk Articles
• Liberty Specialty Presentation on Cyber
?QUESTIONS

More Related Content

What's hot

CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
Sean Graham
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
Michael Solomon
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?
PECB
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Ethan S. Burger
 

What's hot (20)

10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutions
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Eliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber InsuranceEliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber Insurance
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
 
Effects of IT Governance Measures on Cyber-attack Incidents
Effects of IT Governance Measures on Cyber-attack IncidentsEffects of IT Governance Measures on Cyber-attack Incidents
Effects of IT Governance Measures on Cyber-attack Incidents
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
 
New York Cybersecurity Requirements for Financial Services Companies
New York Cybersecurity Requirements for Financial Services CompaniesNew York Cybersecurity Requirements for Financial Services Companies
New York Cybersecurity Requirements for Financial Services Companies
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
 

Viewers also liked

Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security Attacks
Tripwire
 
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlandsdeloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
Dominika Rusek
 
deloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-riskdeloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-risk
Dominika Rusek
 

Viewers also liked (19)

Reinsurance - Infographic
Reinsurance - InfographicReinsurance - Infographic
Reinsurance - Infographic
 
PML Estimation & Its Application in Insurance
PML Estimation & Its Application in Insurance PML Estimation & Its Application in Insurance
PML Estimation & Its Application in Insurance
 
FLEXA IN INSURANCE
FLEXA IN INSURANCE FLEXA IN INSURANCE
FLEXA IN INSURANCE
 
Technology Risk Management
Technology Risk ManagementTechnology Risk Management
Technology Risk Management
 
Better Decision-Making with Power BI
Better Decision-Making with Power BIBetter Decision-Making with Power BI
Better Decision-Making with Power BI
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRC
 
MindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insuranceMindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insurance
 
Cyber risk challenge and the role of insurance
Cyber risk challenge and the role of insuranceCyber risk challenge and the role of insurance
Cyber risk challenge and the role of insurance
 
Cyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationCyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop Presentation
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security Attacks
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
 
Social engineering for security attacks
Social engineering for security attacksSocial engineering for security attacks
Social engineering for security attacks
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber Insurance
 
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlandsdeloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
 
deloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-riskdeloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-risk
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Digital transformation: introduction to cyber risk
Digital transformation: introduction to cyber riskDigital transformation: introduction to cyber risk
Digital transformation: introduction to cyber risk
 
Threat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsThreat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk Programs
 

Similar to Cyber liaility insurance the basics

Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptx
caniceconsulting
 
Chapter 9 security privacy csc
Chapter 9 security privacy cscChapter 9 security privacy csc
Chapter 9 security privacy csc
Hisyam Rosly
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
Vineet Dubey
 

Similar to Cyber liaility insurance the basics (20)

Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
File000119
File000119File000119
File000119
 
e-Commerce: Chapter 6
e-Commerce: Chapter 6e-Commerce: Chapter 6
e-Commerce: Chapter 6
 
Cybersecurity Facts & Figures - What Every Business Needs to Know
Cybersecurity Facts & Figures - What Every Business Needs to KnowCybersecurity Facts & Figures - What Every Business Needs to Know
Cybersecurity Facts & Figures - What Every Business Needs to Know
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptx
 
ComResource Agency Solutions
ComResource Agency SolutionsComResource Agency Solutions
ComResource Agency Solutions
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdf
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business Solutions
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Chapter 9 security privacy csc
Chapter 9 security privacy cscChapter 9 security privacy csc
Chapter 9 security privacy csc
 
Aon Cyber Risk Solutions
Aon Cyber Risk SolutionsAon Cyber Risk Solutions
Aon Cyber Risk Solutions
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 

Cyber liaility insurance the basics

  • 2.  What is Cyber Risk ??  Types of Damages  How are industries exposed to this risk ?  Common Misconceptions in Cyber Risk  Cyber Liability Exposures  Cyber Risk Impact ( Energy Sector )  Insurable Cyber Risks  Pricing & UW Considerations  Managing Cyber Risks OUR DISCUSSION TODAY
  • 3. Cyber Risk • any risk of financial loss, disruption or damage to the reputation of an organisation from some sort of failure of its information technology systems (includes networks & the internet).
  • 4.
  • 5. Non-Physical Damage • Data Corruption • Theft of Intellectual property • Financial DataTheft • Extortion Physical Damage • Infection of software • Manipulation / overriding system controls • Operations disruption Types of Damages
  • 6. 2Types of companies • Companies who have had a security breach • Companies who don’t Know that they have had a breach ALL COMPANIES HAVE CYBER RISK
  • 7. “We have a 3rd Party Payment process , so we have transferred our exposure “ Even if a breach happens with payment processor, Primary company will be still held liable under privacy laws We have upgraded our security by transferring our data to a cloud provider “ Cloud Service providers are the best opportunity for hackers , And guess what the data handled by them isYOUR CUSTOMER DATA ANDTHEFT OFTHAT DATA IS GOINTO PUTYOU INTROUBLE Common Misconceptions
  • 9. Market Disruption • Hacking into company data on reserves – cause industry wide impact • Commodity pricing Physical Damage • Attack on dams – Massive PD & compromise water supply • Gaining control of wind turbine – damage of equipment IMPLICATIONS ON ENERGY SECTOR
  • 10. Human Harm • Hacking a Nuclear plant – Core meltdown – radioactive catastrophe – Another Chernobyl !!!! • Infiltration of Electric grid – Result in mass black-out Financial Loss • Business interruption / CBI • DataTheft • Liability of power producers towards manufactures • Regulatory Fines
  • 12. Economic & physical consequences of cyber attack on energy could be SEVERE !!
  • 13. 2015, Ukraine , Power Grid • Hack on 3 distribution companies • Affected 80,000 Energy Customers 2012, SAUDIARABIA , ARAMCO • 30,000 Computers affected because of virus ( SHAMOON) • Systems offline for 10 Days, 85 % of company's hardware destroyed 2003, Ohio Nuclear Plant • Slammer fastest worm in history disabled safety monitoring systems for 5 Hrs List of Past Cyber Attacks
  • 14. Theft: • Identity theft • Theft of digital assets Business interruption • Lost Income • Recovery of damaged data records • Reputational damage • Cost of Credit Monitoring of impacted clients Key Insurable Cyber Risks
  • 15. Pricing Cyber Risk Strength of Security System Likelihood of intrusion Risk Management Culture Control in place & role of compliance & audit Frequency Severity Disaster Recovery Ability to recover from attack Rating of Service Providers Reliability of cloud providers, backup providers, website, etc Legal Fees & Fines IT Staff Costs Data restoration PR & Marketing Costs Extortion Customer Support Lost Income
  • 16. Policy Terms Legal Liability Not complying with privacy laws Crisis Management Costs Informing customers, public relations & adverts Data Extortion Ransom Payment First Party Risks Third Party Risks Loss of Income As a result of network failure & downtime Data Recovery IT Staff overtime, data retrieval & verification Security Liability Liability arising from breach of security Multimedia Liability Liability arising from insured’s internet, advertising & marketing activities Professional Liability Liability arising out of negligence in providing IT Services
  • 17. Business • Type of business • Size of business • Scope of the business Number of customers Multimedia • Presence on theWeb • Data collected and stored Enterprise Risk Management (ERM) techniques applied by the business to protect its computer network and its assets. • Risk management procedure & culture UW Considerations
  • 18. Cyber Crime – Global Costs - Sources: 1 World Bank (2013) 2Net Losses: Estimating the Global Cost of Cyber-Crime, CSIS/McAfee 3Allianz Global Corporate & Specialty
  • 20. Reasons for buying cyber insurance
  • 21. Greatest concern for cyber risk purchase ( Rated in scale of 1-5)
  • 22. Coverage requirement for new cyber insurance buyers
  • 23. Top Factors for influencing Cyber insurance
  • 24. Policies in which Cyber Extension is given through endorsement
  • 26. Risk Identification / proposal Form Potential Risk Event Likelihood Potential Impact Website copyright/trademark infringement claims Legal liability to others for computer security breaches (non-privacy) Legal liability to others for privacy breaches Privacy breach notification costs & credit monitoring Privacy regulatory action defense and fines Costs to repair damage to your information assets Loss of revenue due to a failure of security or computer attack Loss of revenue due to a failure of security at a dependent technology provider Cyber Extortion Threat
  • 27. • Cyber risk is an emerging risk in the world • Cyber risk is no-longer an IT issue, it is a Board Level issue • Increasing Interconnection & Digitization • Technology vendors play a critical role • Cyber insurance is one mechanism of risk transfer Conclusions
  • 28. In the end everything is D&O liability !!
  • 29. Key Statistics & sources of information • Key Statistics- Source Advisen Ltd – Partner re Publication Oct 2016 • Aon Cyber Survey 2016 • Marsh Global economic Forum – Energy Risk Cyber Article • Allianz Cyber risk Articles • Liberty Specialty Presentation on Cyber