SlideShare a Scribd company logo
Aon Benfield
Cyber Practice Group
Cyber Claims Insight
This new publication, Cyber Claims Insight from Aon Benfield’s Cyber Practice Group,
empowers readers with the resources and tools they need to understand the cyber landscape,
including legal trends, claims and insurance coverage disputes.
Trends in 2016
The Panama Papers
In April 2016, news broke about the Panama
Papers, the largest leak of insider information in
history, involving 11.5 million documents leaked by a
Panamanian law firm to journalists. The documents
implicate politicians, criminals, and celebrities in
sheltering of fortunes in offshore tax havens through
the use of shell companies. More than 100 media
organizations spent a year reviewing leaked files of
data connecting offshore shell companies with
people in multiple countries exposing billions in
assets.
The scandal, and its insurance implications, is still
unfolding, including whether this was a leak or a
hack of the law firm’s email servers.
Data Breach Class Actions
The issue of standing has been a roadblock for data
breach class action lawsuits. On April 14, 2016, in
John Lewert, et al. v. P.F. Chang’s China Bistro,
Inc., the Court of Appeals for the 7
th
Circuit reversed
the District Court’s dismissal of the data breach
class action (based on the lack of standing to sue).
Standing under Article III of the US Constitution is
the ability of a party to bring a lawsuit in court based
upon their stake in the outcome. Citing their own
ruling in 2015 in Remijas v. Neiman Marcus
Group, LLC, the 7
th
Circuit concluded that plaintiffs
who had their credit and debit card data stolen met
the three elements required for standing: 1) Injury:
plaintiff(s) suffered or imminently will suffer injury, 2)
Causation: the injury must be reasonably connected
to the defendant’s conduct, and 3) Redressability: a
favorable court decision must be likely to redress the
injury.
The question remains whether this trend will afford
plaintiffs redress and reimbursement for actual or
potential data breach costs.
Ransomware Attacks
There has been a surge of ransomware attacks on
hospitals in the US with five incidents reported in
recent weeks. Thus far, only one of the five
hospitals, Hollywood Presbyterian (HPMC) in
California has admitted to paying a ransom to unlock
data, while the others resolved the matter by relying
on backup systems. HPMC paid the Bitcoin
equivalent of USD17,000 in February 2016 to regain
control of its mission-critical communications
systems from cyber hostage-takers. The 10-day
intrusion locked employees out of critical electronic
medical record systems in the 434-bed hospital.
HPMC's executives went public about the
ransomware attack to assure the public (and
regulators) that personal healthcare information
(PHI) had not been breached. If patient records had
been exposed, HPMC would have faced fines from
the Department of Health and Human Services for
violations of privacy regulations under HIPAA, as
well as possible patient lawsuits.
Most current breach notification rules would apply
only if PHI had been compromised. Otherwise
extortion payments may not be disclosed. Carriers
will likely be reviewing their insurance wordings in
light of this trend.
First Issue, April 25, 2016
Cyber Practice Group – Cyber Claims Insight – First Issue
Aon Benfield
Cyber Practice Group
Email Fraud
One of the hottest trends in cybercrime is spoofed
emails (aka whaling or business email compromise)
– ostensibly from an authorized corporate official –
instructing an employee to transfer funds out of the
company. According to the FBI, an estimated
USD750 million was stolen from more than 7,000
companies in the US between October 2013 and
August 2015. Typically, these schemes motivate
victims to do the dirty work of the fraudsters by
agreeing to wire funds via manipulated emails.
To counter these schemes, the FBI has urged
companies to use two-step or two-factor
authentication for email, where available, and/or
establish other communication channels to verify
significant transactions, particularly international
wires. Some legal experts take the view that lawsuits
seeking cyber insurance coverage for email fraud
losses will fail due to the voluntary approval of wire
transfers by employees as opposed to cases
involving hackers taking over accounts. Does the
fact that the scam occurs by means of email turn the
scam into a “cyber” loss?
One case pending in federal court in Texas
addresses that question. In Ameriforge Group Inc. v.
Federal Ins. Co., filed in January 2016 in Harris
County, Texas, the plaintiff alleges that its insurer
wrongfully denied coverage under a crime policy for
a spoofed email resulting in the unauthorized
transfer of USD480,000 to a bank in China. The
plaintiff seeks coverage under the “computer fraud
coverage” provision arguing that the email directing
the funds transfer was an “unauthorized introduction
of instructions, programmatic or otherwise, which
propagate themselves” through a computer system.
Federal (a division of Chubb) has denied coverage
arguing that this action did not constitute computer
fraud as defined in the policy, i.e., forgery of a
financial instrument.
Beyond ransomware attacks and email fraud, we are
seeing a trend in coverage disputes both under
traditional comprehensive general liability wording
as well as under cyber policies.
Cyber Coverage Disputes
In Travelers Property Casualty Co. of America v
Federal Recovery Services, Inc., a Utah federal
court found the insurer had no duty to defend its
policyholders in the underlying lawsuit due to the
lack of allegations of negligence (as required by the
policy wording). This was the first coverage decision
regarding a standalone cyber insurance policy, in
particular the “Network and Information Security
Liability and Technology Errors and Omissions
Liability” coverage parts of the cyber policy.
Click here to learn more on this case.
In Continental Casualty Co. v. Cottage Health
Systems, Columbia Casualty filed a declaratory
judgment action in federal court in California seeking
a declaration that it was not obligated to cover
Cottage Health, full reimbursement from Cottage
Health of data breach defense costs, and settlement
payments it paid on their behalf under the cyber
policy containing “Privacy Injury Claims” and
“Privacy Regulation Proceedings” coverage parts.
The challenge arose from the “Failure to Follow
Minimum Required Practices Exclusion” wherein
Columbia Casualty alleged that Cottage Health did
not adhere to certain basic security practices. The
case was dismissed based on the ADR clause in the
contract, so no case precedent has been set.
New Hotel Monteleon, LLC v. Certain Underwriters
at Lloyd’s, filed in December 2015 in Orleans Parish,
Louisiana, involves a coverage dispute as well as a
dispute with the placing broker. The insurer argues
that the USD200,000 sublimit provided by a
payment card industry (PCI) fines and penalties
endorsement applies to all claims arising from a
2014 cyberattack in which payment card numbers
were compromised. The insured argues that the full
policy limits of USD3 million should be available to
cover its losses, including fraud recovery,
operational reimbursement, and case management
fees. A trial is pending, and we will report the
decision.
Cyber Practice Group – Cyber Claims Insight – First Issue 2
Aon Benfield
Cyber Practice Group
In Certain Underwriters of Lloyd’s v. Wunderland
Group, LLC, filed in December 2015 in Circuit Court
in Cook County, Illinois, the plaintiff underwriters
seek a declaration of no coverage under a cyber,
privacy and media policy for a lawsuit alleging that
two employees misappropriated trade secrets when
they left a competitor to work for the insured. The
competitor’s suit alleged that the two former
employees violated their non-disclosure agreements
by using proprietary information relating to the IT
staffing market. The insured argues the suit should
be covered under a provision covering
“Misappropriation of Trade Secrets” and other
information arising from “Media Content” or “User-
Generated Content.” The DJ action is pending, and
we will report the decision.
A new case filed in April 2016 involves a traditional
CGL policy, specifically “publication” coverage. In
Travelers Indemnity Co. of America v. Portal
Healthcare Solutions LLC, the US Court of Appeals
for the Fourth Circuit, in an unpublished opinion,
affirmed the Virginia district court’s ruling on
publication under the GCL policy. The Fourth Circuit
ruled that “publication” occurs when information is
placed before the public, not when a member of the
public reads the information placed before it, thus
finding that Travelers has a duty to defend the
medical records company Portal against a data
breach class action (alleging that its failure to secure
a server caused records to be accessible to
unauthorized users). The appellate court found the
district court judge had correctly applied the eight
corners rule, comparing the complaint to the CGL
policy language, stating that insurers “must use
language clear enough to avoid…ambiguity” if there
are particular types of coverage that it does not want
to provide.” Carriers will be reviewing their CGL
policies, including exclusions recommended by the
Insurance Services Office (ISO).
Contacts
Bill Henriques
Senior Managing Director, Aon Benfield &
Aon Benfield’s Cyber Practice Group Leader
+1 973 966 3565
William.henriques@aonbenfield.com
Dawn Kristy, JD
Claims Specialist, Aon Benfield, Client Operations &
Aon Benfield’s Cyber Practice Group – Legal Trends
Expert
+1.312.381.5483
dawn.kristy@aonbenfield.com
About Aon Benfield
Aon Benfield, a division of Aon plc (NYSE: AON), is
the world’s leading reinsurance intermediary and
full-service capital advisor. We empower our clients
to better understand, manage and transfer risk
through innovative solutions and personalized
access to all forms of global reinsurance capital
across treaty, facultative and capital markets. As a
trusted advocate, we deliver local reach to the
world’s markets, an unparalleled investment in
innovative analytics, including catastrophe
management, actuarial and rating agency advisory.
Through our professionals’ expertise and
experience, we advise clients in making optimal
capital choices that will empower results and
improve operational effectiveness for their business.
With more than 80 offices in 50 countries, our
worldwide client base has access to the broadest
portfolio of integrated capital solutions and services.
To learn how Aon Benfield helps empower results,
please visit aonbenfield.com.
Cyber Practice Group – Cyber Claims Insight – First Issue 3

More Related Content

What's hot

Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
- Mark - Fullbright
 
Govt authentication brief ca v
Govt authentication brief ca vGovt authentication brief ca v
Govt authentication brief ca vMike Kuhn
 
Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4
danc752
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana Harris
IT-oLogy
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Servicegorsline
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011Kimberly Verska
 
Obamacare markets debut as early hurdles may slow signups hCentive news
Obamacare markets debut as early hurdles may slow signups hCentive newsObamacare markets debut as early hurdles may slow signups hCentive news
Obamacare markets debut as early hurdles may slow signups hCentive newsAlisha North
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
spencerharry
 
Obamacare markets debut as early hurdles may slow signups - hCentive news
Obamacare markets debut as early hurdles may slow signups - hCentive newsObamacare markets debut as early hurdles may slow signups - hCentive news
Obamacare markets debut as early hurdles may slow signups - hCentive news
Alisha North
 
CCPA: What You Need to Know
CCPA: What You Need to KnowCCPA: What You Need to Know
CCPA: What You Need to Know
IronCore Labs
 
Business Liability Policy Requires Insurer to Defend Defamation and Business ...
Business Liability Policy Requires Insurer to Defend Defamation and Business ...Business Liability Policy Requires Insurer to Defend Defamation and Business ...
Business Liability Policy Requires Insurer to Defend Defamation and Business ...
NationalUnderwriter
 
Building a Better Credit Report
Building a Better Credit ReportBuilding a Better Credit Report
Building a Better Credit Report
- Mark - Fullbright
 
October2016
October2016October2016
QUIHUIS V. STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANY
QUIHUIS V. STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANY
QUIHUIS V. STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANY
QUIHUIS V. STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANY
enchantingkingd96
 
Idt
IdtIdt
Safeguarding Client Info and File Retention
Safeguarding Client Info and File RetentionSafeguarding Client Info and File Retention
Safeguarding Client Info and File Retention
Downey Law Group LLC
 

What's hot (20)

Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
databreach whitepaper
databreach whitepaperdatabreach whitepaper
databreach whitepaper
 
Govt authentication brief ca v
Govt authentication brief ca vGovt authentication brief ca v
Govt authentication brief ca v
 
Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana Harris
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011
 
Obamacare markets debut as early hurdles may slow signups hCentive news
Obamacare markets debut as early hurdles may slow signups hCentive newsObamacare markets debut as early hurdles may slow signups hCentive news
Obamacare markets debut as early hurdles may slow signups hCentive news
 
Spokeo v Robins
Spokeo v RobinsSpokeo v Robins
Spokeo v Robins
 
Mis417 Group1
Mis417 Group1Mis417 Group1
Mis417 Group1
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
 
Obamacare markets debut as early hurdles may slow signups - hCentive news
Obamacare markets debut as early hurdles may slow signups - hCentive newsObamacare markets debut as early hurdles may slow signups - hCentive news
Obamacare markets debut as early hurdles may slow signups - hCentive news
 
CCPA: What You Need to Know
CCPA: What You Need to KnowCCPA: What You Need to Know
CCPA: What You Need to Know
 
Business Liability Policy Requires Insurer to Defend Defamation and Business ...
Business Liability Policy Requires Insurer to Defend Defamation and Business ...Business Liability Policy Requires Insurer to Defend Defamation and Business ...
Business Liability Policy Requires Insurer to Defend Defamation and Business ...
 
CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]
 
Building a Better Credit Report
Building a Better Credit ReportBuilding a Better Credit Report
Building a Better Credit Report
 
October2016
October2016October2016
October2016
 
QUIHUIS V. STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANY
QUIHUIS V. STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANY
QUIHUIS V. STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANY
QUIHUIS V. STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANY
 
Idt
IdtIdt
Idt
 
Safeguarding Client Info and File Retention
Safeguarding Client Info and File RetentionSafeguarding Client Info and File Retention
Safeguarding Client Info and File Retention
 

Similar to Cyber Claims Insight

2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
- Mark - Fullbright
 
Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016Anthony Rapa
 
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Shawn Tuma
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
Todd Ruback
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015James Sheehan
 
Hacked Customer Accounts
Hacked Customer AccountsHacked Customer Accounts
Hacked Customer AccountsAbbie Olson
 
Cyber security legal and regulatory environment - Executive Discussion
Cyber security legal and regulatory environment - Executive DiscussionCyber security legal and regulatory environment - Executive Discussion
Cyber security legal and regulatory environment - Executive Discussion
Joe Nathans
 
Cybertorts
CybertortsCybertorts
Cybertorts
panabaha
 
New Kmart Data Breach lawsuit spotlights PCI DSS
 New Kmart Data Breach lawsuit spotlights PCI DSS New Kmart Data Breach lawsuit spotlights PCI DSS
New Kmart Data Breach lawsuit spotlights PCI DSS
David Sweigert
 
The Changing Landscape of Cyber Liability
The Changing Landscape of Cyber LiabilityThe Changing Landscape of Cyber Liability
The Changing Landscape of Cyber Liability
Rachel Hamilton
 
Takeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security IncidentsTakeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security Incidents
CBIZ, Inc.
 
Legal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & UsersLegal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & Users
jyates
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
Michael C. Keeling, Esq.
 
Protecting Consumer Information: Can a Breach be Prevented?
Protecting Consumer Information: Can a Breach be Prevented?Protecting Consumer Information: Can a Breach be Prevented?
Protecting Consumer Information: Can a Breach be Prevented?
- Mark - Fullbright
 
FT Week 7 Crital Thinking in the Legal Environment
FT Week 7 Crital Thinking in the Legal EnvironmentFT Week 7 Crital Thinking in the Legal Environment
FT Week 7 Crital Thinking in the Legal EnvironmentFelicia Thomas
 
Heartland Credit Card Security Breach Lawsuit
Heartland Credit Card Security Breach LawsuitHeartland Credit Card Security Breach Lawsuit
Heartland Credit Card Security Breach Lawsuit
LegalDocs
 
National Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy AgendaNational Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy Agenda
nationalconsumersleague
 
Cyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryCyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation Industry
HNI Risk Services
 
employee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityemployee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityPaul Ferrillo
 

Similar to Cyber Claims Insight (20)

2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016
 
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015
 
Hacked Customer Accounts
Hacked Customer AccountsHacked Customer Accounts
Hacked Customer Accounts
 
Cyber security legal and regulatory environment - Executive Discussion
Cyber security legal and regulatory environment - Executive DiscussionCyber security legal and regulatory environment - Executive Discussion
Cyber security legal and regulatory environment - Executive Discussion
 
Cybertorts
CybertortsCybertorts
Cybertorts
 
New Kmart Data Breach lawsuit spotlights PCI DSS
 New Kmart Data Breach lawsuit spotlights PCI DSS New Kmart Data Breach lawsuit spotlights PCI DSS
New Kmart Data Breach lawsuit spotlights PCI DSS
 
The Changing Landscape of Cyber Liability
The Changing Landscape of Cyber LiabilityThe Changing Landscape of Cyber Liability
The Changing Landscape of Cyber Liability
 
Takeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security IncidentsTakeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security Incidents
 
Legal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & UsersLegal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & Users
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
Protecting Consumer Information: Can a Breach be Prevented?
Protecting Consumer Information: Can a Breach be Prevented?Protecting Consumer Information: Can a Breach be Prevented?
Protecting Consumer Information: Can a Breach be Prevented?
 
FT Week 7 Crital Thinking in the Legal Environment
FT Week 7 Crital Thinking in the Legal EnvironmentFT Week 7 Crital Thinking in the Legal Environment
FT Week 7 Crital Thinking in the Legal Environment
 
Cyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation GianinoCyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation Gianino
 
Heartland Credit Card Security Breach Lawsuit
Heartland Credit Card Security Breach LawsuitHeartland Credit Card Security Breach Lawsuit
Heartland Credit Card Security Breach Lawsuit
 
National Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy AgendaNational Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy Agenda
 
Cyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryCyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation Industry
 
employee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityemployee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurity
 

More from Graeme Cross

Temporarily idle sites - COVID19
Temporarily idle sites - COVID19Temporarily idle sites - COVID19
Temporarily idle sites - COVID19
Graeme Cross
 
Surety and Guarantee
Surety and GuaranteeSurety and Guarantee
Surety and Guarantee
Graeme Cross
 
Client bulletin; Brexit
Client bulletin; BrexitClient bulletin; Brexit
Client bulletin; Brexit
Graeme Cross
 
BioEnergy Value Proposition
BioEnergy Value PropositionBioEnergy Value Proposition
BioEnergy Value Proposition
Graeme Cross
 
IFRS Report - Important upcoming accounting changes
IFRS Report -  Important upcoming accounting changes IFRS Report -  Important upcoming accounting changes
IFRS Report - Important upcoming accounting changes
Graeme Cross
 
Aon Cyber Risk Solutions
Aon Cyber Risk SolutionsAon Cyber Risk Solutions
Aon Cyber Risk Solutions
Graeme Cross
 
Aon property laser placemat
Aon property laser placematAon property laser placemat
Aon property laser placemat
Graeme Cross
 
Prepare to Disclose Climate Risk
Prepare to Disclose Climate RiskPrepare to Disclose Climate Risk
Prepare to Disclose Climate Risk
Graeme Cross
 
Supply chain diagnostic brochure
Supply chain diagnostic brochureSupply chain diagnostic brochure
Supply chain diagnostic brochure
Graeme Cross
 
Global supply chain management brochure
Global supply chain management brochureGlobal supply chain management brochure
Global supply chain management brochure
Graeme Cross
 
Aon Global Client Network Fact Sheet
Aon Global Client Network Fact SheetAon Global Client Network Fact Sheet
Aon Global Client Network Fact Sheet
Graeme Cross
 
Aon Global Client Network map
Aon Global Client Network mapAon Global Client Network map
Aon Global Client Network map
Graeme Cross
 
Cyber Client Alert
Cyber Client AlertCyber Client Alert
Cyber Client Alert
Graeme Cross
 
Global optimisation index
Global optimisation indexGlobal optimisation index
Global optimisation index
Graeme Cross
 
Aon Thought Leadership Guide
Aon Thought Leadership GuideAon Thought Leadership Guide
Aon Thought Leadership Guide
Graeme Cross
 
2017 Risk Maps
2017 Risk Maps2017 Risk Maps
2017 Risk Maps
Graeme Cross
 
Environmental insurance market status Q1 2017
Environmental insurance market status Q1 2017Environmental insurance market status Q1 2017
Environmental insurance market status Q1 2017
Graeme Cross
 
Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017
Graeme Cross
 
Aon GDPR prepare and protect solution placemat
Aon GDPR prepare and protect solution placematAon GDPR prepare and protect solution placemat
Aon GDPR prepare and protect solution placemat
Graeme Cross
 
Aon GDPR white paper
Aon GDPR white paperAon GDPR white paper
Aon GDPR white paper
Graeme Cross
 

More from Graeme Cross (20)

Temporarily idle sites - COVID19
Temporarily idle sites - COVID19Temporarily idle sites - COVID19
Temporarily idle sites - COVID19
 
Surety and Guarantee
Surety and GuaranteeSurety and Guarantee
Surety and Guarantee
 
Client bulletin; Brexit
Client bulletin; BrexitClient bulletin; Brexit
Client bulletin; Brexit
 
BioEnergy Value Proposition
BioEnergy Value PropositionBioEnergy Value Proposition
BioEnergy Value Proposition
 
IFRS Report - Important upcoming accounting changes
IFRS Report -  Important upcoming accounting changes IFRS Report -  Important upcoming accounting changes
IFRS Report - Important upcoming accounting changes
 
Aon Cyber Risk Solutions
Aon Cyber Risk SolutionsAon Cyber Risk Solutions
Aon Cyber Risk Solutions
 
Aon property laser placemat
Aon property laser placematAon property laser placemat
Aon property laser placemat
 
Prepare to Disclose Climate Risk
Prepare to Disclose Climate RiskPrepare to Disclose Climate Risk
Prepare to Disclose Climate Risk
 
Supply chain diagnostic brochure
Supply chain diagnostic brochureSupply chain diagnostic brochure
Supply chain diagnostic brochure
 
Global supply chain management brochure
Global supply chain management brochureGlobal supply chain management brochure
Global supply chain management brochure
 
Aon Global Client Network Fact Sheet
Aon Global Client Network Fact SheetAon Global Client Network Fact Sheet
Aon Global Client Network Fact Sheet
 
Aon Global Client Network map
Aon Global Client Network mapAon Global Client Network map
Aon Global Client Network map
 
Cyber Client Alert
Cyber Client AlertCyber Client Alert
Cyber Client Alert
 
Global optimisation index
Global optimisation indexGlobal optimisation index
Global optimisation index
 
Aon Thought Leadership Guide
Aon Thought Leadership GuideAon Thought Leadership Guide
Aon Thought Leadership Guide
 
2017 Risk Maps
2017 Risk Maps2017 Risk Maps
2017 Risk Maps
 
Environmental insurance market status Q1 2017
Environmental insurance market status Q1 2017Environmental insurance market status Q1 2017
Environmental insurance market status Q1 2017
 
Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017
 
Aon GDPR prepare and protect solution placemat
Aon GDPR prepare and protect solution placematAon GDPR prepare and protect solution placemat
Aon GDPR prepare and protect solution placemat
 
Aon GDPR white paper
Aon GDPR white paperAon GDPR white paper
Aon GDPR white paper
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Cyber Claims Insight

  • 1. Aon Benfield Cyber Practice Group Cyber Claims Insight This new publication, Cyber Claims Insight from Aon Benfield’s Cyber Practice Group, empowers readers with the resources and tools they need to understand the cyber landscape, including legal trends, claims and insurance coverage disputes. Trends in 2016 The Panama Papers In April 2016, news broke about the Panama Papers, the largest leak of insider information in history, involving 11.5 million documents leaked by a Panamanian law firm to journalists. The documents implicate politicians, criminals, and celebrities in sheltering of fortunes in offshore tax havens through the use of shell companies. More than 100 media organizations spent a year reviewing leaked files of data connecting offshore shell companies with people in multiple countries exposing billions in assets. The scandal, and its insurance implications, is still unfolding, including whether this was a leak or a hack of the law firm’s email servers. Data Breach Class Actions The issue of standing has been a roadblock for data breach class action lawsuits. On April 14, 2016, in John Lewert, et al. v. P.F. Chang’s China Bistro, Inc., the Court of Appeals for the 7 th Circuit reversed the District Court’s dismissal of the data breach class action (based on the lack of standing to sue). Standing under Article III of the US Constitution is the ability of a party to bring a lawsuit in court based upon their stake in the outcome. Citing their own ruling in 2015 in Remijas v. Neiman Marcus Group, LLC, the 7 th Circuit concluded that plaintiffs who had their credit and debit card data stolen met the three elements required for standing: 1) Injury: plaintiff(s) suffered or imminently will suffer injury, 2) Causation: the injury must be reasonably connected to the defendant’s conduct, and 3) Redressability: a favorable court decision must be likely to redress the injury. The question remains whether this trend will afford plaintiffs redress and reimbursement for actual or potential data breach costs. Ransomware Attacks There has been a surge of ransomware attacks on hospitals in the US with five incidents reported in recent weeks. Thus far, only one of the five hospitals, Hollywood Presbyterian (HPMC) in California has admitted to paying a ransom to unlock data, while the others resolved the matter by relying on backup systems. HPMC paid the Bitcoin equivalent of USD17,000 in February 2016 to regain control of its mission-critical communications systems from cyber hostage-takers. The 10-day intrusion locked employees out of critical electronic medical record systems in the 434-bed hospital. HPMC's executives went public about the ransomware attack to assure the public (and regulators) that personal healthcare information (PHI) had not been breached. If patient records had been exposed, HPMC would have faced fines from the Department of Health and Human Services for violations of privacy regulations under HIPAA, as well as possible patient lawsuits. Most current breach notification rules would apply only if PHI had been compromised. Otherwise extortion payments may not be disclosed. Carriers will likely be reviewing their insurance wordings in light of this trend. First Issue, April 25, 2016 Cyber Practice Group – Cyber Claims Insight – First Issue
  • 2. Aon Benfield Cyber Practice Group Email Fraud One of the hottest trends in cybercrime is spoofed emails (aka whaling or business email compromise) – ostensibly from an authorized corporate official – instructing an employee to transfer funds out of the company. According to the FBI, an estimated USD750 million was stolen from more than 7,000 companies in the US between October 2013 and August 2015. Typically, these schemes motivate victims to do the dirty work of the fraudsters by agreeing to wire funds via manipulated emails. To counter these schemes, the FBI has urged companies to use two-step or two-factor authentication for email, where available, and/or establish other communication channels to verify significant transactions, particularly international wires. Some legal experts take the view that lawsuits seeking cyber insurance coverage for email fraud losses will fail due to the voluntary approval of wire transfers by employees as opposed to cases involving hackers taking over accounts. Does the fact that the scam occurs by means of email turn the scam into a “cyber” loss? One case pending in federal court in Texas addresses that question. In Ameriforge Group Inc. v. Federal Ins. Co., filed in January 2016 in Harris County, Texas, the plaintiff alleges that its insurer wrongfully denied coverage under a crime policy for a spoofed email resulting in the unauthorized transfer of USD480,000 to a bank in China. The plaintiff seeks coverage under the “computer fraud coverage” provision arguing that the email directing the funds transfer was an “unauthorized introduction of instructions, programmatic or otherwise, which propagate themselves” through a computer system. Federal (a division of Chubb) has denied coverage arguing that this action did not constitute computer fraud as defined in the policy, i.e., forgery of a financial instrument. Beyond ransomware attacks and email fraud, we are seeing a trend in coverage disputes both under traditional comprehensive general liability wording as well as under cyber policies. Cyber Coverage Disputes In Travelers Property Casualty Co. of America v Federal Recovery Services, Inc., a Utah federal court found the insurer had no duty to defend its policyholders in the underlying lawsuit due to the lack of allegations of negligence (as required by the policy wording). This was the first coverage decision regarding a standalone cyber insurance policy, in particular the “Network and Information Security Liability and Technology Errors and Omissions Liability” coverage parts of the cyber policy. Click here to learn more on this case. In Continental Casualty Co. v. Cottage Health Systems, Columbia Casualty filed a declaratory judgment action in federal court in California seeking a declaration that it was not obligated to cover Cottage Health, full reimbursement from Cottage Health of data breach defense costs, and settlement payments it paid on their behalf under the cyber policy containing “Privacy Injury Claims” and “Privacy Regulation Proceedings” coverage parts. The challenge arose from the “Failure to Follow Minimum Required Practices Exclusion” wherein Columbia Casualty alleged that Cottage Health did not adhere to certain basic security practices. The case was dismissed based on the ADR clause in the contract, so no case precedent has been set. New Hotel Monteleon, LLC v. Certain Underwriters at Lloyd’s, filed in December 2015 in Orleans Parish, Louisiana, involves a coverage dispute as well as a dispute with the placing broker. The insurer argues that the USD200,000 sublimit provided by a payment card industry (PCI) fines and penalties endorsement applies to all claims arising from a 2014 cyberattack in which payment card numbers were compromised. The insured argues that the full policy limits of USD3 million should be available to cover its losses, including fraud recovery, operational reimbursement, and case management fees. A trial is pending, and we will report the decision. Cyber Practice Group – Cyber Claims Insight – First Issue 2
  • 3. Aon Benfield Cyber Practice Group In Certain Underwriters of Lloyd’s v. Wunderland Group, LLC, filed in December 2015 in Circuit Court in Cook County, Illinois, the plaintiff underwriters seek a declaration of no coverage under a cyber, privacy and media policy for a lawsuit alleging that two employees misappropriated trade secrets when they left a competitor to work for the insured. The competitor’s suit alleged that the two former employees violated their non-disclosure agreements by using proprietary information relating to the IT staffing market. The insured argues the suit should be covered under a provision covering “Misappropriation of Trade Secrets” and other information arising from “Media Content” or “User- Generated Content.” The DJ action is pending, and we will report the decision. A new case filed in April 2016 involves a traditional CGL policy, specifically “publication” coverage. In Travelers Indemnity Co. of America v. Portal Healthcare Solutions LLC, the US Court of Appeals for the Fourth Circuit, in an unpublished opinion, affirmed the Virginia district court’s ruling on publication under the GCL policy. The Fourth Circuit ruled that “publication” occurs when information is placed before the public, not when a member of the public reads the information placed before it, thus finding that Travelers has a duty to defend the medical records company Portal against a data breach class action (alleging that its failure to secure a server caused records to be accessible to unauthorized users). The appellate court found the district court judge had correctly applied the eight corners rule, comparing the complaint to the CGL policy language, stating that insurers “must use language clear enough to avoid…ambiguity” if there are particular types of coverage that it does not want to provide.” Carriers will be reviewing their CGL policies, including exclusions recommended by the Insurance Services Office (ISO). Contacts Bill Henriques Senior Managing Director, Aon Benfield & Aon Benfield’s Cyber Practice Group Leader +1 973 966 3565 William.henriques@aonbenfield.com Dawn Kristy, JD Claims Specialist, Aon Benfield, Client Operations & Aon Benfield’s Cyber Practice Group – Legal Trends Expert +1.312.381.5483 dawn.kristy@aonbenfield.com About Aon Benfield Aon Benfield, a division of Aon plc (NYSE: AON), is the world’s leading reinsurance intermediary and full-service capital advisor. We empower our clients to better understand, manage and transfer risk through innovative solutions and personalized access to all forms of global reinsurance capital across treaty, facultative and capital markets. As a trusted advocate, we deliver local reach to the world’s markets, an unparalleled investment in innovative analytics, including catastrophe management, actuarial and rating agency advisory. Through our professionals’ expertise and experience, we advise clients in making optimal capital choices that will empower results and improve operational effectiveness for their business. With more than 80 offices in 50 countries, our worldwide client base has access to the broadest portfolio of integrated capital solutions and services. To learn how Aon Benfield helps empower results, please visit aonbenfield.com. Cyber Practice Group – Cyber Claims Insight – First Issue 3