SlideShare a Scribd company logo
Cyber Liability
Provided by: Sean Graham, Client Executive
2 CMW
Agenda
• Understand the Risks
• Privacy Laws Developing
• Currently in the Courts
• Types of Risks
• Identify and Manage Risks
• Basic Loss Control Techniques
• Cyber Risk Coverage
3 CMW
Understand the Risks
• Kroger Co.
• Home Depot Canada
• Best Buy Canada
• AbeBooks
• Barclays Bank
• Capital One
What do all these companies and institutions
have in common?
They have all been victims of data breach
between 2012-2014.
4 CMW
Understand the Risks
• Millions of stolen records containing personal information
 Social insurance numbers
 Credit card numbers
 Bank account numbers
If your Organization handles employees or customers’
personal data, intellectual property or proprietary
corporate data, you are at risk.
5 CMW
Understand the Risks
• Common assumption that smaller businesses are not
targets of cyber crime
• 40% of data breaches were small to mid-sized
businesses
(Symantec SMB Threat Awareness Poll Global Results)
6 CMW
Privacy Laws Developing
• New Alberta law requires notification to government and
each person affected
• BC law on the horizon
• Cost of informing ~$10-20 per record
7 CMW
Currently in the Courts
• Evans v. Scotia, 2014 ONSC2135
 Class action certified alleging employee stole 643 customer
information files, resulting in 138 cases of fraud
• Condon v. Canada, 2014 FC250
 Class action certified, alleging lost drive with 583,000 individuals
information, including name, SIN, DOB
Defense costs in such cases are often higher than the
settlements.
8 CMW
Types of Risks
• Viruses
• Worms
• Trojan horses
• Logic bombs
• Denial of Service (DoS) and Distributed Denial of Service (DDoS)
• Spyware
• Data breach
• Phishing
• Spam
Computer Intrusions
9 CMW
Types of Risks
• Internal sources such as disgruntled employee with knowledge of
computer systems
• External sources such as hacker looking to steal/destroy a
company’s intangible assets
Computer Intrusions
10 CMW
Types of Risks
• Loss of physical devices considered cyber breaches if containing
private records/proprietary information
 Smartphones
 Laptops
 USB drives
Physical Devices
11 CMW
Types of Risks
• Your company is responsible for content posted on social media
• Employee posts using your name apply
Social Media
12 CMW
Identify and Manage Risks
• Identify the sensitive data you store
 Customer (financial information, contact information, purchase history,
buying habits)
 Employee (payroll files, bank information, social insurance numbers,
home addresses and phone numbers, work and personal e-mails)
 Business (financial records, marketing plans, product designs and tax
information)
Limiting Intrusions
13 CMW
Identify and Manage Risks
• Identify where data is stored
 Data most at risk when on the move
• Identify who accesses your data
 Only provide access to those who require it
• Publish only appropriate information
 Company websites among first places cyber criminals look for data
Limiting Intrusions
14 CMW
Basic Loss Control Techniques
• Install a firewall for your network
• Encrypt data
• Install anti-virus, anti-malware and anti-spyware software
• Implement an employee password policy
• Back up data regularly
• Develop a business continuity plan
• Develop privacy, password, internet usage, social media
policies
15 CMW
Basic Loss Control Techniques
• Secure company facilities
• Minimize and safeguard printed materials with sensitive
information
 Procedures to limit quantity printed
• Dispose of trash securely
• Dispose of electronic equipment securely
• Train employees in facility security procedures
16 CMW
Cyber Risk Coverage
• Data is not tangible property
• Triggered by named perils - not virus or hacking
• Requires “direct” physical loss
• Breach privacy due to hacking or other “non-publication” related
disclosure
• Damage to others’ intangible property
• Related non-advertising intellectual property infringement (except
patent or trade secret)
• Websites with editorial content (i.e. medical advice, white papers,
blogs) falling outside definition of advertisement
What’s Not Covered in CGL
17 CMW
Cyber Risk Coverage
• First and third party losses resulting from:
 Network security breach i.e. computer virus downloaded or
accidentally transmitted to customer
 Privacy breach caused by misplaced laptop, hard copy file, etc.
 Internet Media Liability arising from content posted on website or
electronically elsewhere
Risks that Trigger Coverage
18 CMW
Cyber Risk Coverage
• Access to data risk management services providers
• Defense costs, including forensic investigation costs
• Voluntary notification cost
• Public relations expense - repair reputation
• All reasonable and necessary expenses arising out of a credible
extortion demand
• Damage from extortion covered by other insuring agreements
• Coverage limits starting at $100,000 as low as $250 premium
Common Coverages
19 CMW
Take the next step to learn more.
Contact Sean Graham, Client Executive at CMW
Insurance Ltd, to learn more and custom fit a Cyber Risk
Solution for your organization today.
Call: 604-484-3707
Email: sgraham@cmwinsurance.com
Web: www.cmwinsurance.com
Cyber Liability Insurance is inexpensive effective
coverage, with annual premiums starting as low as
$250.

More Related Content

What's hot

CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
HB Litigation Conferences
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Don Grauel
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
Jim Brashear
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
Christopher Rieser
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
pdewitte
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Paige Rasid
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
saurnou
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Law
guest8b10a3
 
Cyber liaility insurance the basics
Cyber liaility insurance   the basicsCyber liaility insurance   the basics
Cyber liaility insurance the basics
Chandrasekar Koushik ACII®
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Nicholas Van Exan
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
- Mark - Fullbright
 
New York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsNew York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity Regulations
Shawn Tuma
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
EMC
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
SafeNet
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
Quarles & Brady
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
Shawn Tuma
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
Glenn E. Davis
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
This account is closed
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
SecureDocs
 
Business Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer SystemsBusiness Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer Systems
- Mark - Fullbright
 

What's hot (20)

CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Law
 
Cyber liaility insurance the basics
Cyber liaility insurance   the basicsCyber liaility insurance   the basics
Cyber liaility insurance the basics
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
 
New York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsNew York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity Regulations
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
 
Business Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer SystemsBusiness Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer Systems
 

Viewers also liked

Understanding DB2 Optimizer
Understanding DB2 OptimizerUnderstanding DB2 Optimizer
Understanding DB2 Optimizer
terraborealis
 
What Is CustomerCentric Selling®
What Is CustomerCentric Selling®What Is CustomerCentric Selling®
What Is CustomerCentric Selling®
The Naro Group
 
CRM assignment
CRM assignmentCRM assignment
CRM assignment
Ponmathi Singhania
 
Data Management Strategies
Data Management StrategiesData Management Strategies
Data Management Strategies
Micheal Axelsen
 
B2B Branding
B2B BrandingB2B Branding
B2B Branding
Ashutosh Agrawal
 
Customer experience architecture
Customer experience architectureCustomer experience architecture
Customer experience architecture
Livework Studio
 
Dibucaine number
Dibucaine numberDibucaine number
Dibucaine number
Dr Sandeep
 
Desalter Desalting
Desalter  DesaltingDesalter  Desalting
12 Deductive Thinking Puzzles
12 Deductive Thinking Puzzles12 Deductive Thinking Puzzles
12 Deductive Thinking Puzzles
OH TEIK BIN
 
Project Requirements, What Are They And How Do You Know You
Project Requirements, What Are They And How Do You Know YouProject Requirements, What Are They And How Do You Know You
Project Requirements, What Are They And How Do You Know You
John N. Motlagh
 
Drug dilution
Drug dilutionDrug dilution
Drug dilution
Aizuddin Misro
 
IBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use CasesIBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway
 
How to Build a DevOps Toolchain
How to Build a DevOps ToolchainHow to Build a DevOps Toolchain
How to Build a DevOps Toolchain
IBM UrbanCode Products
 
Antiemeticos..farma
Antiemeticos..farmaAntiemeticos..farma
Antiemeticos..farma
google
 
X ray tube
X ray tubeX ray tube
X ray tube
Rad Tech
 
급대출//BU797。СΟΜ//법인신용대출 제3금융기관
급대출//BU797。СΟΜ//법인신용대출 제3금융기관급대출//BU797。СΟΜ//법인신용대출 제3금융기관
급대출//BU797。СΟΜ//법인신용대출 제3금융기관
hsldfsod
 
Phát triển dịch vụ phi tín dụng của các ngân hàng thương mại nhà nước việt nam
Phát triển dịch vụ phi tín dụng của các ngân hàng thương mại nhà nước việt namPhát triển dịch vụ phi tín dụng của các ngân hàng thương mại nhà nước việt nam
Phát triển dịch vụ phi tín dụng của các ngân hàng thương mại nhà nước việt nam
https://www.facebook.com/garmentspace
 
Accounts Payable (AP) Process Flow
Accounts Payable (AP) Process FlowAccounts Payable (AP) Process Flow
Accounts Payable (AP) Process Flow
Mukeshkumar Raju
 
DENTAL PLASTER
DENTAL PLASTERDENTAL PLASTER
DENTAL PLASTER
Anubhav Sharma
 
THE ADIDAS SLOGAN: FROM ‘’IMPOSSIBLE IS NOTHING’’ TO ‘’ADIDAS IS ALL IN ‘’
THE ADIDAS SLOGAN: FROM ‘’IMPOSSIBLE IS NOTHING’’  TO ‘’ADIDAS IS ALL IN ‘’THE ADIDAS SLOGAN: FROM ‘’IMPOSSIBLE IS NOTHING’’  TO ‘’ADIDAS IS ALL IN ‘’
THE ADIDAS SLOGAN: FROM ‘’IMPOSSIBLE IS NOTHING’’ TO ‘’ADIDAS IS ALL IN ‘’
Irem Guler
 

Viewers also liked (20)

Understanding DB2 Optimizer
Understanding DB2 OptimizerUnderstanding DB2 Optimizer
Understanding DB2 Optimizer
 
What Is CustomerCentric Selling®
What Is CustomerCentric Selling®What Is CustomerCentric Selling®
What Is CustomerCentric Selling®
 
CRM assignment
CRM assignmentCRM assignment
CRM assignment
 
Data Management Strategies
Data Management StrategiesData Management Strategies
Data Management Strategies
 
B2B Branding
B2B BrandingB2B Branding
B2B Branding
 
Customer experience architecture
Customer experience architectureCustomer experience architecture
Customer experience architecture
 
Dibucaine number
Dibucaine numberDibucaine number
Dibucaine number
 
Desalter Desalting
Desalter  DesaltingDesalter  Desalting
Desalter Desalting
 
12 Deductive Thinking Puzzles
12 Deductive Thinking Puzzles12 Deductive Thinking Puzzles
12 Deductive Thinking Puzzles
 
Project Requirements, What Are They And How Do You Know You
Project Requirements, What Are They And How Do You Know YouProject Requirements, What Are They And How Do You Know You
Project Requirements, What Are They And How Do You Know You
 
Drug dilution
Drug dilutionDrug dilution
Drug dilution
 
IBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use CasesIBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use Cases
 
How to Build a DevOps Toolchain
How to Build a DevOps ToolchainHow to Build a DevOps Toolchain
How to Build a DevOps Toolchain
 
Antiemeticos..farma
Antiemeticos..farmaAntiemeticos..farma
Antiemeticos..farma
 
X ray tube
X ray tubeX ray tube
X ray tube
 
급대출//BU797。СΟΜ//법인신용대출 제3금융기관
급대출//BU797。СΟΜ//법인신용대출 제3금융기관급대출//BU797。СΟΜ//법인신용대출 제3금융기관
급대출//BU797。СΟΜ//법인신용대출 제3금융기관
 
Phát triển dịch vụ phi tín dụng của các ngân hàng thương mại nhà nước việt nam
Phát triển dịch vụ phi tín dụng của các ngân hàng thương mại nhà nước việt namPhát triển dịch vụ phi tín dụng của các ngân hàng thương mại nhà nước việt nam
Phát triển dịch vụ phi tín dụng của các ngân hàng thương mại nhà nước việt nam
 
Accounts Payable (AP) Process Flow
Accounts Payable (AP) Process FlowAccounts Payable (AP) Process Flow
Accounts Payable (AP) Process Flow
 
DENTAL PLASTER
DENTAL PLASTERDENTAL PLASTER
DENTAL PLASTER
 
THE ADIDAS SLOGAN: FROM ‘’IMPOSSIBLE IS NOTHING’’ TO ‘’ADIDAS IS ALL IN ‘’
THE ADIDAS SLOGAN: FROM ‘’IMPOSSIBLE IS NOTHING’’  TO ‘’ADIDAS IS ALL IN ‘’THE ADIDAS SLOGAN: FROM ‘’IMPOSSIBLE IS NOTHING’’  TO ‘’ADIDAS IS ALL IN ‘’
THE ADIDAS SLOGAN: FROM ‘’IMPOSSIBLE IS NOTHING’’ TO ‘’ADIDAS IS ALL IN ‘’
 

Similar to CMW Cyber Liability Presentation

nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
ssusera5ade5
 
Ransomware: Prevention, privacy and your options post-breach
Ransomware: Prevention, privacy and your options post-breachRansomware: Prevention, privacy and your options post-breach
Ransomware: Prevention, privacy and your options post-breach
Gowling WLG
 
Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBs
Mary Brophy
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
OCTF Industry Engagement
 
e-Commerce: Chapter 6
e-Commerce: Chapter 6e-Commerce: Chapter 6
e-Commerce: Chapter 6
annwhyjay
 
Shining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark WebShining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark Web
SurfWatch Labs
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Jay Kesan
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
OCTF Industry Engagement
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
Varshil Patel
 
Cybersecurity Workshop
Cybersecurity Workshop Cybersecurity Workshop
Cybersecurity Workshop
Kaufman & Canoles
 
CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15
E Andrew Keeney
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
OCTF Industry Engagement
 
Data Breach Slide Show
Data Breach Slide ShowData Breach Slide Show
Data Breach Slide Show
zeidan61
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
cliff_rudolph
 
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksGathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
SurfWatch Labs
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
CCIAOR
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
Nick Chandi
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
Gloucestershire Professionals
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
isc2-hellenic
 
Why is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital WorldWhy is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital World
Expeed Software
 

Similar to CMW Cyber Liability Presentation (20)

nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
Ransomware: Prevention, privacy and your options post-breach
Ransomware: Prevention, privacy and your options post-breachRansomware: Prevention, privacy and your options post-breach
Ransomware: Prevention, privacy and your options post-breach
 
Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBs
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
e-Commerce: Chapter 6
e-Commerce: Chapter 6e-Commerce: Chapter 6
e-Commerce: Chapter 6
 
Shining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark WebShining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark Web
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cybersecurity Workshop
Cybersecurity Workshop Cybersecurity Workshop
Cybersecurity Workshop
 
CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
 
Data Breach Slide Show
Data Breach Slide ShowData Breach Slide Show
Data Breach Slide Show
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksGathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
Why is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital WorldWhy is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital World
 

CMW Cyber Liability Presentation

  • 1. Cyber Liability Provided by: Sean Graham, Client Executive
  • 2. 2 CMW Agenda • Understand the Risks • Privacy Laws Developing • Currently in the Courts • Types of Risks • Identify and Manage Risks • Basic Loss Control Techniques • Cyber Risk Coverage
  • 3. 3 CMW Understand the Risks • Kroger Co. • Home Depot Canada • Best Buy Canada • AbeBooks • Barclays Bank • Capital One What do all these companies and institutions have in common? They have all been victims of data breach between 2012-2014.
  • 4. 4 CMW Understand the Risks • Millions of stolen records containing personal information  Social insurance numbers  Credit card numbers  Bank account numbers If your Organization handles employees or customers’ personal data, intellectual property or proprietary corporate data, you are at risk.
  • 5. 5 CMW Understand the Risks • Common assumption that smaller businesses are not targets of cyber crime • 40% of data breaches were small to mid-sized businesses (Symantec SMB Threat Awareness Poll Global Results)
  • 6. 6 CMW Privacy Laws Developing • New Alberta law requires notification to government and each person affected • BC law on the horizon • Cost of informing ~$10-20 per record
  • 7. 7 CMW Currently in the Courts • Evans v. Scotia, 2014 ONSC2135  Class action certified alleging employee stole 643 customer information files, resulting in 138 cases of fraud • Condon v. Canada, 2014 FC250  Class action certified, alleging lost drive with 583,000 individuals information, including name, SIN, DOB Defense costs in such cases are often higher than the settlements.
  • 8. 8 CMW Types of Risks • Viruses • Worms • Trojan horses • Logic bombs • Denial of Service (DoS) and Distributed Denial of Service (DDoS) • Spyware • Data breach • Phishing • Spam Computer Intrusions
  • 9. 9 CMW Types of Risks • Internal sources such as disgruntled employee with knowledge of computer systems • External sources such as hacker looking to steal/destroy a company’s intangible assets Computer Intrusions
  • 10. 10 CMW Types of Risks • Loss of physical devices considered cyber breaches if containing private records/proprietary information  Smartphones  Laptops  USB drives Physical Devices
  • 11. 11 CMW Types of Risks • Your company is responsible for content posted on social media • Employee posts using your name apply Social Media
  • 12. 12 CMW Identify and Manage Risks • Identify the sensitive data you store  Customer (financial information, contact information, purchase history, buying habits)  Employee (payroll files, bank information, social insurance numbers, home addresses and phone numbers, work and personal e-mails)  Business (financial records, marketing plans, product designs and tax information) Limiting Intrusions
  • 13. 13 CMW Identify and Manage Risks • Identify where data is stored  Data most at risk when on the move • Identify who accesses your data  Only provide access to those who require it • Publish only appropriate information  Company websites among first places cyber criminals look for data Limiting Intrusions
  • 14. 14 CMW Basic Loss Control Techniques • Install a firewall for your network • Encrypt data • Install anti-virus, anti-malware and anti-spyware software • Implement an employee password policy • Back up data regularly • Develop a business continuity plan • Develop privacy, password, internet usage, social media policies
  • 15. 15 CMW Basic Loss Control Techniques • Secure company facilities • Minimize and safeguard printed materials with sensitive information  Procedures to limit quantity printed • Dispose of trash securely • Dispose of electronic equipment securely • Train employees in facility security procedures
  • 16. 16 CMW Cyber Risk Coverage • Data is not tangible property • Triggered by named perils - not virus or hacking • Requires “direct” physical loss • Breach privacy due to hacking or other “non-publication” related disclosure • Damage to others’ intangible property • Related non-advertising intellectual property infringement (except patent or trade secret) • Websites with editorial content (i.e. medical advice, white papers, blogs) falling outside definition of advertisement What’s Not Covered in CGL
  • 17. 17 CMW Cyber Risk Coverage • First and third party losses resulting from:  Network security breach i.e. computer virus downloaded or accidentally transmitted to customer  Privacy breach caused by misplaced laptop, hard copy file, etc.  Internet Media Liability arising from content posted on website or electronically elsewhere Risks that Trigger Coverage
  • 18. 18 CMW Cyber Risk Coverage • Access to data risk management services providers • Defense costs, including forensic investigation costs • Voluntary notification cost • Public relations expense - repair reputation • All reasonable and necessary expenses arising out of a credible extortion demand • Damage from extortion covered by other insuring agreements • Coverage limits starting at $100,000 as low as $250 premium Common Coverages
  • 19. 19 CMW Take the next step to learn more. Contact Sean Graham, Client Executive at CMW Insurance Ltd, to learn more and custom fit a Cyber Risk Solution for your organization today. Call: 604-484-3707 Email: sgraham@cmwinsurance.com Web: www.cmwinsurance.com Cyber Liability Insurance is inexpensive effective coverage, with annual premiums starting as low as $250.