Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cyber Insurance

Netpluz Asia Pte Ltd
Netpluz Asia Pte LtdNetpluz Asia Pte Ltd
Ignorance is Risk
CYBER INSURANCE
Common Misconceptions About Cyber Insurance
2
“ My company is not exposed to cyber attacks”
“We outsource so I have no risk”
“Cyber attacks are only a problem for big companies”
“Cyber Insurance is too expensive, I have no budget”
Chubb’s Global Cyber Practice
Years of
experience
writing cyber
insurance
Countries
with cyber
policies
Cyber
claims
handled
Chubb
employees in
the global
cyber practice
Million
individuals
notified
following
privacy breach
3
Too small to fail?
Types of
Cyber incidents
experienced by
Companies
4
Chubb’s Reported Incidents by Industry Over the Last Decade
5
Chubb’s Three Year Average Cost of First Party Expenses following a cyber event
6
$29,830
$191,544
$74,337
$56,879
$27,423
$0
$50,000
$100,000
$150,000
$200,000
$250,000
Legal Costs Forensics Notification/Call
Center
Credit Monitoring PR/Crisis Response
63% of Chubb’s reported
incidents are less than 100
compromised records
Chubb’s Exposure
Statistics by Triggers
Over the Last
Decade
7
Human Error, 24%
Hack, 19%
Privacy Violations, 19%
Lost/Stolen Devices, 15%
Phishing, 13%
Malware, 7%
“I’ve got nothing they want”
8
Source: Symantec 2019
Item Cost
▪ Fake ID, Drivers License Passport
▪ Hacked emails accounts
▪ Scans of Real Passports
▪ Custom Malware ( ex banking trojans)
▪ Cash redirector service
▪ Stolen Cloud Accounts
▪ Ransomware toolkit
▪ $25 to $5,000
▪ $1 to $15
▪ $1 to $35
▪ $5 to $200
▪ $5 to 1% of value
▪ $2 to $12
▪ $0 - $250
Cyber Claims Examples and
Incident Response Platform
Cyber Enterprise Risk Management
Case Study 1: Ransomware attack
With the servers down, the Insured
was unable to fulfil their clients’ orders.
Business interruption loss was estimated
to cost over $250,000 a day. The hacker
demanded a ransom to decrypt each
server, with the ransom amount
increasing if payment was not made
within 2 days.
The Insured is a
company operating
in the advertising
industry, with an
annual revenue of
$30 million.
Day of Incident
During the weekend,
a malicious file infected the
company's servers and all files
including artwork, historic and
current project data were affected.
The Insured reported
the incident, and
spoke to the Incident
Response Manager
on the same day.
An IT forensics firm
was deployed
immediately.
Chubb's Incident Response
Team assisted the Insured with
a mitigation strategy by
identifying less business-critical
servers that could be restored
from backups, and negotiating
the ransom amount to release
business-critical servers.
10 Days from Incident
100% of operations restored.
The IT Forensics provided an
incident report to the Insured,
with recommendations to
improve cyber security and
prevent future incidents.
Legal advisors assisted
the Insured with the
filing of a formal
criminal complaint as
well as other regulatory
documentations.
3 Days from Incident
The response team removed the
ransomware from the affected servers,
allowing the company to operate at
70% of typical capacity. The response
team also engaged a crisis management
firm to assist with client communications.
This cyber incident was reported through Chubb's 24/7/365 Cyber Alert mobile application,
and the following stakeholders were activated to provide a holistic response to the Insured's
cyber incident.
Legal and Regulatory
Advice
IT Forensics
Crisis Management
Firm
Forensic
Accounting
Report Incident
Cyber Alert
Incident Response Manager
13
Case Study 2: Ransomware Attack, infected local drives
Description of Event
A construction company that outsourced its IT operations suffered a
ransomware attack because an employee clicked a malicious email
link, causing the company’s customer and project data to be encrypted.
The ransomware infected local hard drives and data that was backed
up online. Without access to the digital records, the company could not
operate its business as usual. Due to the failed attempts to negotiate
with the extortionist, additional costs were incurred to re-construct
and re-enter customer project records. This resulted in significant
downtime and major loss incurred to the business.
Coverage Triggers: Ransomware, Incident Response Expenses,
Data Asset Loss, Business Interruption
Client Profile
Location:
Singapore
Industry:
Construction
Revenue:
S$5 million
14
Case Study 3: Laptop Stolen Results In Invasion of Privacy
Description of event:
An energy company executive’s laptop was stolen from a corporate vehicle. The laptop
contained significant private customer and employee information. Although the file was
encrypted, the overall password protection on the laptop was weak and the PIN for accessing
the encrypted information was compromised.
Resolution:
After assessing the nature of the information on the laptop with a forensic expert and outside
compliance counsel at a cost of $50,000, the energy company voluntarily notified relevant
customers and employees and afforded call centre, monitoring, and restoration services, as
appropriate. While the additional first-party cost was $100,000, the energy company also
incurred $75,000 in expenses responding to a multi-state regulatory investigation. Ultimately,
the company was fined $100,000 for deviating from its publicly stated privacy policy
Coverage triggers: Incident Response Expenses, Data Asset Loss, Privacy Liability,
Business Interruption, Recovery Costs, Regulatory investigation, Potential Payment Card Loss
Client Profile
Location:
Singapore
Industry:
Energy Firm
Revenue:
S$20 million
Number of
Employees:
100
Case Study 4: Unauthorised Access - Employee Accesses HR Site, Sells
Personal Information
December, 2020
Client Profile
Location:
Singapore
Industry:
Professional
Services Firm
Revenue:
S$7.5mil
15
Description of event:
A rogue employee accessed the human resource platform of a
professional service provider. The employee acquired and sold social
security information on the black market before being apprehended
by law enforcement. Thereafter, several cases of identity theft were
perpetrated against the professional service provider’s employees.
Resolution:
The professional service provider engaged a forensics investigator and
outside compliance counsel. It also notified employees of the breach,
established a call centre, and provided monitoring and restoration
services to impacted employees.
Client Profile
Location:
Hong Kong
Industry: Hospitality
Revenue:
US$150k - US$200k
Case Study 5: Human Error
November 25, 2020
16
• The Insured outsources its data hosting to a third party company.
• One evening, before heading home, an engineer at the hosting location
turned off the Insured’s firewall, by accident
• The firewall remained turned off for a little over 12 hours, causing a
number of servers to malfunction, which led to discovery of the error
Situation
• The Insured’s broker notified Chubb directly.
• The Insured provided a project brief outlining the work that had to be
done (including forced shutdown to isolate the potential areas of
damage, installation and migration to a new host and determining the
extent of any malware attack)
• They sought Chubb’s assistance with identifying a suitable vendor and
agreement to the brief/budget
Activation
November 25, 2020
17
Response & Coverage
Chubb acknowledged
notification from
broker immediately,
and advised next steps.
Following a sweep, it
was found that no
malware had been
introduced.
Focus was on restoring
the data lost due to the
malfunctioning servers,
which data was
restored mainly via the
Insured’s backup
server.
Insured chose to use
their own legal vendor
to assist with
regulatory compliance
requirements,
including notification
of the incident to the
authorities.
Policy responded to
cover:
• Incident Response
Expenses
• Data & System
Recovery costs
Chubb’s Cyber Incident Response Platform
18
Call our Hotline 24/7/365
Guaranteed response
Client report cyber event using any of the following methods
Insurance Coverage
There are first party and third party covers
Data and System Recovery **
Increased cost of work and other costs
to recover data, repair or restore software,
identify and remove malware, and to
recover business operations.
> Triggered by Business Interruption Incident.
FirstParty
ThirdParty
Business Interruption **
Covers loss of net profit and continuing
operating and payroll expenses.
> Triggered by Business Interruption Incident.
Cyber Extortion
Covers a cyber extortion payment and
the cost to hire a crisis negotiation
specialist.
> Triggered by Cyber Extortion.
Privacy & Network Security Liability **
Defence and damages for claims arising from:
• Duty to maintain confidentiality of personal
or corporate information
• Duty to maintain a secure network for
third parties
Media Liability **
Defence and damages for
claims arising from improper
online media activity.
Incident Response
Costs to mitigate any cyber incident:
• Incident Response Manager
• IT Forensics
• Legal Advice
• Notification
• Fraud Restoration
• Call Centre
• Public Relations
To be insured, or not?
59% do not
fully understand
the insurance
solutions available.
62% have never
purchased cyber
insurance before
or after an incident.
The role of Insurance
53%
would value
having a hands-on
response service.
54%
would value the
ability to identify and
minimise the impact
of a cyber incident.
20
Chubb. Insured.
1 of 21

Recommended

Cyber Risk Management in the New Digitalisation Age - eSentinel™ by
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Netpluz Asia Pte Ltd
2.1K views58 slides
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl... by
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz Asia Pte Ltd
2K views17 slides
2019 Cyber Security Trends by
2019 Cyber Security Trends2019 Cyber Security Trends
2019 Cyber Security TrendsInternetwork Engineering (IE)
329 views25 slides
Cybersecurity in Banking Sector by
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking SectorQuick Heal Technologies Ltd.
8.7K views15 slides
Security/Compliance - Advanced Threat Detection and Compliance by
Security/Compliance - Advanced Threat Detection and ComplianceSecurity/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and ComplianceAdvanced Technology Consulting (ATC)
1.1K views14 slides
Outlook Briefing 2016: Cyber Security by
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityMastel Indonesia
3.6K views23 slides

More Related Content

What's hot

Must Know Cyber Security Stats of 2016 by
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016DWP Information Architects Inc.
537 views28 slides
Cyber Security and the National Central Banks by
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central BanksCommunity Protection Forum
1.6K views16 slides
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at... by
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...Michael Noel
221 views39 slides
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E... by
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
2.2K views20 slides
Axxera End Point Security Protection by
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
938 views7 slides
The Future of Cyber Security by
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
11.8K views51 slides

What's hot(20)

You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at... by Michael Noel
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel221 views
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E... by Symantec
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Symantec2.2K views
Axxera End Point Security Protection by Shawn Crimson
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
Shawn Crimson938 views
The Future of Cyber Security by Stephen Lahanas
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
Stephen Lahanas11.8K views
Introduction to Cyber Security by kailash shaw
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
kailash shaw125 views
Creating cyber forensic readiness in your organisation by Jacqueline Fick
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
Jacqueline Fick717 views
Key Findings from the 2015 IBM Cyber Security Intelligence Index by IBM Security
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
IBM Security6.2K views
The IBM X-Force 2016 Cyber Security Intelligence Index by Kanishka Ramyar
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence Index
Kanishka Ramyar8.3K views
The State Of Information and Cyber Security in 2016 by Shannon G., MBA
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
Shannon G., MBA895 views
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi by Knowledge Group
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Knowledge Group789 views
Aon Ransomware Response and Mitigation Strategies by CSNP
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation Strategies
CSNP89 views
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights by IBM Security
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
IBM Security2.7K views
100+ Cyber Security Interview Questions and Answers in 2022 by Temok IT Services
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
Temok IT Services240 views
Cyber Security Threats in the Financial Sector by Farook Al-Jibouri
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial Sector
Farook Al-Jibouri1.1K views
Cybersecurity | Risk. Impact. Innovations. by Vertex Holdings
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
Vertex Holdings2.6K views
Cybersecurity: Protection strategies from Cisco and Next Dimension by Next Dimension Inc.
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
Top 10 leading fraud detection and prevention solution providers by Merry D'souza
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
Merry D'souza42 views

Similar to Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cyber Insurance

Cyber by
Cyber Cyber
Cyber Alberto Peñaranda Echevarría
287 views4 slides
Captive Insurance and Cyber Risk by
Captive Insurance and Cyber RiskCaptive Insurance and Cyber Risk
Captive Insurance and Cyber RiskThe Law Office of Hale Stewart
1.1K views12 slides
B crisis by
B crisisB crisis
B crisisJose Patrick
59 views4 slides
The Basics of Cyber Insurance by
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber InsuranceHB Litigation Conferences
4.1K views26 slides
Infocom security 2016 - Cromar Presentation by
Infocom security 2016 - Cromar PresentationInfocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationEthos Media S.A.
406 views29 slides
Eliminating the Confusion Surrounding Cyber Insurance by
Eliminating the Confusion Surrounding Cyber InsuranceEliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber InsuranceInternetwork Engineering (IE)
98 views13 slides

Similar to Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cyber Insurance(20)

Infocom security 2016 - Cromar Presentation by Ethos Media S.A.
Infocom security 2016 - Cromar PresentationInfocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar Presentation
Ethos Media S.A.406 views
CCIAOR Cyber Security Forum by CCIAOR
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
CCIAOR236 views
Application security meetup data privacy_27052021 by lior mazor
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
lior mazor112 views
What Not-for-Profits Can Do To Prevent "Uninspired" Theft by CBIZ, Inc.
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
CBIZ, Inc.168 views
Cybersecurity crisis management a prep guide by JoAnna Cheshire
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
JoAnna Cheshire1.4K views
How to Use a Cyber Loss Model within a Retail Bank by Thomas Lee
How to Use a Cyber Loss Model within a Retail BankHow to Use a Cyber Loss Model within a Retail Bank
How to Use a Cyber Loss Model within a Retail Bank
Thomas Lee174 views
Cyber Risk and Marine Insurance by Peter Hulyer
Cyber Risk and Marine InsuranceCyber Risk and Marine Insurance
Cyber Risk and Marine Insurance
Peter Hulyer234 views
Cyber Risks Looming in the Transportation Industry by HNI Risk Services
Cyber Risks Looming in the Transportation IndustryCyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation Industry
HNI Risk Services1.2K views
Cyber Liability - Insurance Risk Management and Preparation by Eric Reehl
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and Preparation
Eric Reehl1.4K views

More from Netpluz Asia Pte Ltd

Netpluz corp presentation 2020 by
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz Asia Pte Ltd
155 views42 slides
Secure & Protect your Data with Druva by
Secure & Protect your Data with Druva Secure & Protect your Data with Druva
Secure & Protect your Data with Druva Netpluz Asia Pte Ltd
1.5K views17 slides
The State of Ransomware 2020 by
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020Netpluz Asia Pte Ltd
1.6K views35 slides
Simplifying Communication with Microsoft Teams & Netpluz SIP Trunk by
Simplifying Communication with Microsoft Teams & Netpluz SIP TrunkSimplifying Communication with Microsoft Teams & Netpluz SIP Trunk
Simplifying Communication with Microsoft Teams & Netpluz SIP TrunkNetpluz Asia Pte Ltd
1.9K views12 slides
SAY HELLO TO MICROSOFT TEAMS by
SAY HELLO TO MICROSOFT TEAMSSAY HELLO TO MICROSOFT TEAMS
SAY HELLO TO MICROSOFT TEAMSNetpluz Asia Pte Ltd
1.9K views19 slides
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA... by
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...Netpluz Asia Pte Ltd
240 views42 slides

More from Netpluz Asia Pte Ltd(20)

Simplifying Communication with Microsoft Teams & Netpluz SIP Trunk by Netpluz Asia Pte Ltd
Simplifying Communication with Microsoft Teams & Netpluz SIP TrunkSimplifying Communication with Microsoft Teams & Netpluz SIP Trunk
Simplifying Communication with Microsoft Teams & Netpluz SIP Trunk
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA... by Netpluz Asia Pte Ltd
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel™ – 360° Cybersecurity Platform Simplified by Netpluz Asia Pte Ltd
eSentinel™ – 360° Cybersecurity Platform SimplifiedeSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform Simplified
Using a secured, cloud-delivered SD-WAN to transform your business network by Netpluz Asia Pte Ltd
Using a secured, cloud-delivered SD-WAN to transform your business networkUsing a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business network
VAPT - Vulnerability Assessment & Penetration Testing by Netpluz Asia Pte Ltd
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
Y5Zone Singapore - Wifi Advertisement & EDM services by Netpluz Asia Pte Ltd
Y5Zone Singapore - Wifi Advertisement & EDM services Y5Zone Singapore - Wifi Advertisement & EDM services
Y5Zone Singapore - Wifi Advertisement & EDM services
Managed Security Operations Centre Alternative - Managed Security Service by Netpluz Asia Pte Ltd
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service

Recently uploaded

ZARA.pptx by
ZARA.pptxZARA.pptx
ZARA.pptxmerlinjenma529
29 views13 slides
Super Solar Mounting Solutions 20230509(1).pdf by
Super Solar Mounting Solutions 20230509(1).pdfSuper Solar Mounting Solutions 20230509(1).pdf
Super Solar Mounting Solutions 20230509(1).pdfcarrie55bradshaw
10 views25 slides
Accounts Class 12 project cash flow statement and ratio analysis by
Accounts Class 12 project cash flow statement and ratio analysisAccounts Class 12 project cash flow statement and ratio analysis
Accounts Class 12 project cash flow statement and ratio analysisJinendraPamecha
22 views42 slides
Presentation on proposed acquisition of leading European asset manager Aermon... by
Presentation on proposed acquisition of leading European asset manager Aermon...Presentation on proposed acquisition of leading European asset manager Aermon...
Presentation on proposed acquisition of leading European asset manager Aermon...KeppelCorporation
171 views11 slides
Coomes Consulting Business Profile by
Coomes Consulting Business ProfileCoomes Consulting Business Profile
Coomes Consulting Business ProfileChris Coomes
46 views10 slides
NewBase 02 December 2023 Energy News issue - 1678 by Khaled Al Awadi.pdf by
NewBase  02 December 2023  Energy News issue - 1678 by Khaled Al Awadi.pdfNewBase  02 December 2023  Energy News issue - 1678 by Khaled Al Awadi.pdf
NewBase 02 December 2023 Energy News issue - 1678 by Khaled Al Awadi.pdfKhaled Al Awadi
9 views17 slides

Recently uploaded(20)

Super Solar Mounting Solutions 20230509(1).pdf by carrie55bradshaw
Super Solar Mounting Solutions 20230509(1).pdfSuper Solar Mounting Solutions 20230509(1).pdf
Super Solar Mounting Solutions 20230509(1).pdf
carrie55bradshaw10 views
Accounts Class 12 project cash flow statement and ratio analysis by JinendraPamecha
Accounts Class 12 project cash flow statement and ratio analysisAccounts Class 12 project cash flow statement and ratio analysis
Accounts Class 12 project cash flow statement and ratio analysis
JinendraPamecha22 views
Presentation on proposed acquisition of leading European asset manager Aermon... by KeppelCorporation
Presentation on proposed acquisition of leading European asset manager Aermon...Presentation on proposed acquisition of leading European asset manager Aermon...
Presentation on proposed acquisition of leading European asset manager Aermon...
KeppelCorporation171 views
Coomes Consulting Business Profile by Chris Coomes
Coomes Consulting Business ProfileCoomes Consulting Business Profile
Coomes Consulting Business Profile
Chris Coomes46 views
NewBase 02 December 2023 Energy News issue - 1678 by Khaled Al Awadi.pdf by Khaled Al Awadi
NewBase  02 December 2023  Energy News issue - 1678 by Khaled Al Awadi.pdfNewBase  02 December 2023  Energy News issue - 1678 by Khaled Al Awadi.pdf
NewBase 02 December 2023 Energy News issue - 1678 by Khaled Al Awadi.pdf
Khaled Al Awadi9 views
Discover the Finest Interior Painting Services in Miami Elevate Your Space wi... by Florida Painting Miami
Discover the Finest Interior Painting Services in Miami Elevate Your Space wi...Discover the Finest Interior Painting Services in Miami Elevate Your Space wi...
Discover the Finest Interior Painting Services in Miami Elevate Your Space wi...
voice logger software aegis.pdf by Nirmal Sharma
voice logger software aegis.pdfvoice logger software aegis.pdf
voice logger software aegis.pdf
Nirmal Sharma30 views
Bloomerang Thank Yous Dec 2023.pdf by Bloomerang
Bloomerang Thank Yous Dec 2023.pdfBloomerang Thank Yous Dec 2023.pdf
Bloomerang Thank Yous Dec 2023.pdf
Bloomerang93 views
Imports Next Level.pdf by Bloomerang
Imports Next Level.pdfImports Next Level.pdf
Imports Next Level.pdf
Bloomerang80 views
Assignment 4: Reporting to Management.pptx by BethanyAline
Assignment 4: Reporting to Management.pptxAssignment 4: Reporting to Management.pptx
Assignment 4: Reporting to Management.pptx
BethanyAline17 views
Top 10 Web Development Companies in California by TopCSSGallery
Top 10 Web Development Companies in CaliforniaTop 10 Web Development Companies in California
Top 10 Web Development Companies in California
TopCSSGallery44 views
Integrating Talent Management Practices by Seta Wicaksana
Integrating Talent Management PracticesIntegrating Talent Management Practices
Integrating Talent Management Practices
Seta Wicaksana28 views
See the new MTN tariffs effected November 28, 2023 by Kweku Zurek
See the new MTN tariffs effected November 28, 2023See the new MTN tariffs effected November 28, 2023
See the new MTN tariffs effected November 28, 2023
Kweku Zurek29.4K views

Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cyber Insurance

  • 2. Common Misconceptions About Cyber Insurance 2 “ My company is not exposed to cyber attacks” “We outsource so I have no risk” “Cyber attacks are only a problem for big companies” “Cyber Insurance is too expensive, I have no budget”
  • 3. Chubb’s Global Cyber Practice Years of experience writing cyber insurance Countries with cyber policies Cyber claims handled Chubb employees in the global cyber practice Million individuals notified following privacy breach 3
  • 4. Too small to fail? Types of Cyber incidents experienced by Companies 4
  • 5. Chubb’s Reported Incidents by Industry Over the Last Decade 5
  • 6. Chubb’s Three Year Average Cost of First Party Expenses following a cyber event 6 $29,830 $191,544 $74,337 $56,879 $27,423 $0 $50,000 $100,000 $150,000 $200,000 $250,000 Legal Costs Forensics Notification/Call Center Credit Monitoring PR/Crisis Response 63% of Chubb’s reported incidents are less than 100 compromised records
  • 7. Chubb’s Exposure Statistics by Triggers Over the Last Decade 7 Human Error, 24% Hack, 19% Privacy Violations, 19% Lost/Stolen Devices, 15% Phishing, 13% Malware, 7%
  • 8. “I’ve got nothing they want” 8 Source: Symantec 2019 Item Cost ▪ Fake ID, Drivers License Passport ▪ Hacked emails accounts ▪ Scans of Real Passports ▪ Custom Malware ( ex banking trojans) ▪ Cash redirector service ▪ Stolen Cloud Accounts ▪ Ransomware toolkit ▪ $25 to $5,000 ▪ $1 to $15 ▪ $1 to $35 ▪ $5 to $200 ▪ $5 to 1% of value ▪ $2 to $12 ▪ $0 - $250
  • 9. Cyber Claims Examples and Incident Response Platform
  • 10. Cyber Enterprise Risk Management Case Study 1: Ransomware attack With the servers down, the Insured was unable to fulfil their clients’ orders. Business interruption loss was estimated to cost over $250,000 a day. The hacker demanded a ransom to decrypt each server, with the ransom amount increasing if payment was not made within 2 days. The Insured is a company operating in the advertising industry, with an annual revenue of $30 million. Day of Incident During the weekend, a malicious file infected the company's servers and all files including artwork, historic and current project data were affected. The Insured reported the incident, and spoke to the Incident Response Manager on the same day. An IT forensics firm was deployed immediately.
  • 11. Chubb's Incident Response Team assisted the Insured with a mitigation strategy by identifying less business-critical servers that could be restored from backups, and negotiating the ransom amount to release business-critical servers. 10 Days from Incident 100% of operations restored. The IT Forensics provided an incident report to the Insured, with recommendations to improve cyber security and prevent future incidents. Legal advisors assisted the Insured with the filing of a formal criminal complaint as well as other regulatory documentations. 3 Days from Incident The response team removed the ransomware from the affected servers, allowing the company to operate at 70% of typical capacity. The response team also engaged a crisis management firm to assist with client communications.
  • 12. This cyber incident was reported through Chubb's 24/7/365 Cyber Alert mobile application, and the following stakeholders were activated to provide a holistic response to the Insured's cyber incident. Legal and Regulatory Advice IT Forensics Crisis Management Firm Forensic Accounting Report Incident Cyber Alert Incident Response Manager
  • 13. 13 Case Study 2: Ransomware Attack, infected local drives Description of Event A construction company that outsourced its IT operations suffered a ransomware attack because an employee clicked a malicious email link, causing the company’s customer and project data to be encrypted. The ransomware infected local hard drives and data that was backed up online. Without access to the digital records, the company could not operate its business as usual. Due to the failed attempts to negotiate with the extortionist, additional costs were incurred to re-construct and re-enter customer project records. This resulted in significant downtime and major loss incurred to the business. Coverage Triggers: Ransomware, Incident Response Expenses, Data Asset Loss, Business Interruption Client Profile Location: Singapore Industry: Construction Revenue: S$5 million
  • 14. 14 Case Study 3: Laptop Stolen Results In Invasion of Privacy Description of event: An energy company executive’s laptop was stolen from a corporate vehicle. The laptop contained significant private customer and employee information. Although the file was encrypted, the overall password protection on the laptop was weak and the PIN for accessing the encrypted information was compromised. Resolution: After assessing the nature of the information on the laptop with a forensic expert and outside compliance counsel at a cost of $50,000, the energy company voluntarily notified relevant customers and employees and afforded call centre, monitoring, and restoration services, as appropriate. While the additional first-party cost was $100,000, the energy company also incurred $75,000 in expenses responding to a multi-state regulatory investigation. Ultimately, the company was fined $100,000 for deviating from its publicly stated privacy policy Coverage triggers: Incident Response Expenses, Data Asset Loss, Privacy Liability, Business Interruption, Recovery Costs, Regulatory investigation, Potential Payment Card Loss Client Profile Location: Singapore Industry: Energy Firm Revenue: S$20 million Number of Employees: 100
  • 15. Case Study 4: Unauthorised Access - Employee Accesses HR Site, Sells Personal Information December, 2020 Client Profile Location: Singapore Industry: Professional Services Firm Revenue: S$7.5mil 15 Description of event: A rogue employee accessed the human resource platform of a professional service provider. The employee acquired and sold social security information on the black market before being apprehended by law enforcement. Thereafter, several cases of identity theft were perpetrated against the professional service provider’s employees. Resolution: The professional service provider engaged a forensics investigator and outside compliance counsel. It also notified employees of the breach, established a call centre, and provided monitoring and restoration services to impacted employees.
  • 16. Client Profile Location: Hong Kong Industry: Hospitality Revenue: US$150k - US$200k Case Study 5: Human Error November 25, 2020 16 • The Insured outsources its data hosting to a third party company. • One evening, before heading home, an engineer at the hosting location turned off the Insured’s firewall, by accident • The firewall remained turned off for a little over 12 hours, causing a number of servers to malfunction, which led to discovery of the error Situation • The Insured’s broker notified Chubb directly. • The Insured provided a project brief outlining the work that had to be done (including forced shutdown to isolate the potential areas of damage, installation and migration to a new host and determining the extent of any malware attack) • They sought Chubb’s assistance with identifying a suitable vendor and agreement to the brief/budget Activation
  • 17. November 25, 2020 17 Response & Coverage Chubb acknowledged notification from broker immediately, and advised next steps. Following a sweep, it was found that no malware had been introduced. Focus was on restoring the data lost due to the malfunctioning servers, which data was restored mainly via the Insured’s backup server. Insured chose to use their own legal vendor to assist with regulatory compliance requirements, including notification of the incident to the authorities. Policy responded to cover: • Incident Response Expenses • Data & System Recovery costs
  • 18. Chubb’s Cyber Incident Response Platform 18 Call our Hotline 24/7/365 Guaranteed response Client report cyber event using any of the following methods
  • 19. Insurance Coverage There are first party and third party covers Data and System Recovery ** Increased cost of work and other costs to recover data, repair or restore software, identify and remove malware, and to recover business operations. > Triggered by Business Interruption Incident. FirstParty ThirdParty Business Interruption ** Covers loss of net profit and continuing operating and payroll expenses. > Triggered by Business Interruption Incident. Cyber Extortion Covers a cyber extortion payment and the cost to hire a crisis negotiation specialist. > Triggered by Cyber Extortion. Privacy & Network Security Liability ** Defence and damages for claims arising from: • Duty to maintain confidentiality of personal or corporate information • Duty to maintain a secure network for third parties Media Liability ** Defence and damages for claims arising from improper online media activity. Incident Response Costs to mitigate any cyber incident: • Incident Response Manager • IT Forensics • Legal Advice • Notification • Fraud Restoration • Call Centre • Public Relations
  • 20. To be insured, or not? 59% do not fully understand the insurance solutions available. 62% have never purchased cyber insurance before or after an incident. The role of Insurance 53% would value having a hands-on response service. 54% would value the ability to identify and minimise the impact of a cyber incident. 20