SlideShare a Scribd company logo
CYBER RISKS & CYBER
INSURANCE
The
Cyber
Insurance
Consultancy
Chris Stallard – Chief Insurance Imagineer
chris@zemstarinsurance.com.au
‘CYBER’ – WHERE DID IT COME FROM?
First coined from Mathematics Professor Norbert Wiener in 1948.
Ground breaking account of various systems that led and influenced
AI and complex systems.
“Cyber” itself is derived from a Greek term meaning ‘steersman’ or
‘governor’
Chris Stallard – Chief Insurance Imagineer
chris@zemstarinsurance.com.au
A BRIEF HISTORY OF CYBER TIME
First policies
bound in the
US in the late
1990’s
Low product evolution
due to Y2K and 9/11
2016 -
US – Mature
UK/Europe – Growing
Asia/AU and NZ – Emerging
2008 –
Cyber Premiums
in region of $500m
Circa. 2000 –
First Betterley Report
on Cyber Insurance
2020 –
Global GWP
Estimated at $7.5bn
to $15bn
Chris Stallard – Chief Insurance Imagineer
chris@zemstarinsurance.com.au
WHY BUY CYBER INSURANCE?
•  Privacy Legislation including the Australian Privacy Principles (APPs)
•  Forms part of an effective risk management framework
•  PCI-DSS obligations
•  Ubiquitous exposure - IoT
•  Lack of coverage within traditional insurance programs
•  Potential for system vulnerabilities
•  Benefits of accessing expertise when it is needed
•  Bad guys attack weaknesses not strengths
Chris Stallard – Chief Insurance Imagineer
chris@zemstarinsurance.com.au
GREAT NEWS !! –
YOU HAVE THE SKILLS TO SELL
As an Insurance
Professional, you already
have risk transfer knowledge.
Risk considerations and
exposures associated with
Cyber are very similar to
those that businesses
already face.
Quite simply, a business
faces the impact of a Cyber
event on their operations and
revenue.
In addition to first party
exposures they have to third
parties (customers primarily).
In line with tradition, there will
be costs and expenses
associated with managing
impact:
-  including increased costs
of working
-  business interruption
-  defence costs
-  investigation costs
-  other expenses such as
expert services.
Chris Stallard – Chief Insurance Imagineer
chris@zemstarinsurance.com.au
CYBER….YOUR FAMILIAR BUT NEW RISK
Fire Damage Business Interruption Event Expenses Third Party Actions
E-mail
attachment
contained the
Virus
Virus
Attack
Applications
and Data
Damage
3 weeks to
reconstitute
data and 3
months to
recover
BI
Systems &
Data
recovery
experts,
Customer
comms.
Event
Expense
Customers
bring action
following
exposure of
PII
Third
Party
Actions
Chris Stallard – Chief Insurance Imagineer
chris@zemstarinsurance.com.au
CYBER COVERAGE
BI
Cost to replace, restore (data) from network breach
Costs of extortion monies and expenses
Business Interruption – loss of income and extra expenses
Identity theft
Breach of Privacy
Failure to protect confidential data
Transmission of spyware, viruses & code
Notification costs incurred
Regulatory Defence costs
PR and Crisis Management costs
Fine and Penalties
1st Party
3rd Party
Costs
Damage
Event
Expense
TPAs Event
Expense
Event
Expense
Chris Stallard – Chief Insurance Imagineer
chris@zemstarinsurance.com.au
RISK TRANSFER OR COVER GAP?
TRADITIONAL
PROGRAM
COVERS
Versus
COVERAGE
SHORTFALLS
Unlikely that policies will provide cover for data breaches
Typically require physical loss or damage and may specifically exclude electronic data
Would usually only respond to actions bought against D&Os for ‘Wrongful Act’
Cover is not usually afforded for information/data breaches (unless part of ‘Professional Services)
Most Cyber extensions are only as effective as the underlying policy trigger
GL
D&O
/ML
PROP
PI/
E&O
EXTS.
Chris Stallard – Chief Insurance Imagineer
chris@zemstarinsurance.com.au
LOSS SCENARIOS:
LOST LAPTOP
A laptop which is used by a
number of employees is left in a
coffee shop in the Sydney CBD. It
cannot be located.
The Laptop contains 25,000
customers records including
names, addresses and banking
information.
RANSOMWARE
A business owner opens their
first e-mail of the day.The
opening line reads “Your data has
been locked by us”.
The content is clear, there is a
threat that the company data will
be erased unless a ransom of 250
Bitcoins is paid.
SYSTEMVULNERABILITY
Personal and financial
information has been obtain via
security weaknesses in a
computer system. Over 250,000
identities implicated.
The Insured was made aware of
the breach/es by the Federal
Police and immediate cessation
of operations is required.
Chris Stallard – Chief Insurance Imagineer
chris@zemstarinsurance.com.au
SCENARIO 1
A company laptop has been left in a coffee shop in the Sydney CBD. It cannot be located.
The Laptop contains 25,000 customers records including names, addresses and banking information.
LOST
LAPTOP
Most policies will cover the costs of
recovering data (but usually only as a
result of a ‘virus’ attack).
Policies do not typically cover physical
property and the laptop should be
insured under a property policy
1st Party
Most policies will provide cover for
actions bought against the insured for
breach or privacy or for damages as a
result of personal information
impacting a third party e.g. credit
history black marks.
3rd Party
•  Notifying customers of breach
•  Costs of monitoring credit reports
•  Defence costs in respect of third
party claims or regulatory
investigation/action
Costs
Chris Stallard – Chief Insurance Imagineer
chris@zemstarinsurance.com.au
SCENARIO 2
Business owner opens an e-mail.The opening line reads “Your data has been locked by us”.
There is a threat that the company data will be erased unless a ransom of 250 Bitcoins is paid.
RANSOM
Extortion threats are usually covered
under market forms including the
payment of monies to release or
prevent data damage. However, the
recommendation is that no payment is
made, as monies demanded can
increase and there is no guarantee that
data will be left untouched
1st Party
In the event that any PII or PHI is
exposed then most policies will
respond to actions bought by third
parties and/or regulatory authorities
3rd Party
•  Costs of monitoring credit reports
•  Investigation and virus removal
costs
•  Defence costs in respect of third
party claims or regulatory
investigation/action
Costs
Chris Stallard – Chief Insurance Imagineer
chris@zemstarinsurance.com.au
SCENARIO 3
Personal and financial information has been obtain via a weaknesses in a computer system. Over 250,000
identities implicated.
Federal Police advised insured of the breach and immediate cessation of operations is required.
SYSTEM
VULNERABILITY
Should the investigation result in a
material impact to the operations of
the business preventing them from
operating, some policies do make
provision for impact on profit or
revenue
1st Party
In the event that any PII or PHI is
exposed then most policies will
respond to actions bought by third
parties and/or regulatory authorities.
3rd Party
•  Costs of monitoring credit reports
•  Investigation and virus removal
costs
•  Defence costs in respect of third
party claims or regulatory
investigation/action
Costs
Chris Stallard – Chief Insurance Imagineer
chris@zemstarinsurance.com.au

More Related Content

What's hot

Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
Ethan S. Burger
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
IISPEastMids
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance
Hubbard Insurance Group
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Statewide Insurance Brokers
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
topseowebmaster
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
Paige Rasid
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
Paul Melson
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability PresentationSean Graham
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
CBIZ, Inc.
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
Abdul-Hakeem Ajijola
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Logikcull.com
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
Dawn Yankeelov
 
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
Quarles & Brady
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
Merry D'souza
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual review
Morgan Jones
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
Tripwire
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?
PECB
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
Nathan Desfontaines
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 

What's hot (20)

Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
Cyber
Cyber Cyber
Cyber
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
 
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual review
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 

Viewers also liked

Cyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryCyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation Industry
HNI Risk Services
 
Better Decision-Making with Power BI
Better Decision-Making with Power BIBetter Decision-Making with Power BI
Better Decision-Making with Power BI
Aptera Inc
 
MindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insuranceMindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insurance
mindleaftechnologies
 
2016年10月13日「ONA16」参加報告会
2016年10月13日「ONA16」参加報告会2016年10月13日「ONA16」参加報告会
2016年10月13日「ONA16」参加報告会
Atsuo Fujimura
 
Como As Apis Podem Lhe Ajudar A Criar Um MLP
Como As Apis Podem Lhe Ajudar A Criar Um MLPComo As Apis Podem Lhe Ajudar A Criar Um MLP
Como As Apis Podem Lhe Ajudar A Criar Um MLP
Cristina Luz
 
Aula bootstrap
Aula bootstrapAula bootstrap
Aula bootstrap
Cristina Luz
 
#Poli conditioner
#Poli conditioner#Poli conditioner
#Poli conditioner
Fernando Londoño
 
Informática e educação
Informática e educação Informática e educação
Informática e educação
FabianeJulia
 
Conceptos basicos de las redes
Conceptos basicos de las redesConceptos basicos de las redes
Conceptos basicos de las redes
pabloquin0925
 
El ser humano y la tecnologia1
El ser humano y la tecnologia1El ser humano y la tecnologia1
El ser humano y la tecnologia1
claudia valeria gutierrez vargas
 
Proyecto de unidad magisterial
Proyecto de unidad magisterialProyecto de unidad magisterial
Proyecto de unidad magisterial
unidad magisterial
 
Trabajo Colectivo
Trabajo ColectivoTrabajo Colectivo
Trabajo Colectivo
pabloquin0925
 
Aula bootstrap-carousel
Aula bootstrap-carouselAula bootstrap-carousel
Aula bootstrap-carousel
Cristina Luz
 
Venezuela
VenezuelaVenezuela
Venezuela
Melany Gallegos
 

Viewers also liked (15)

Cyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryCyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation Industry
 
Better Decision-Making with Power BI
Better Decision-Making with Power BIBetter Decision-Making with Power BI
Better Decision-Making with Power BI
 
MindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insuranceMindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insurance
 
2016年10月13日「ONA16」参加報告会
2016年10月13日「ONA16」参加報告会2016年10月13日「ONA16」参加報告会
2016年10月13日「ONA16」参加報告会
 
Como As Apis Podem Lhe Ajudar A Criar Um MLP
Como As Apis Podem Lhe Ajudar A Criar Um MLPComo As Apis Podem Lhe Ajudar A Criar Um MLP
Como As Apis Podem Lhe Ajudar A Criar Um MLP
 
Aula bootstrap
Aula bootstrapAula bootstrap
Aula bootstrap
 
#Poli conditioner
#Poli conditioner#Poli conditioner
#Poli conditioner
 
SimpleXpense-prezi
SimpleXpense-preziSimpleXpense-prezi
SimpleXpense-prezi
 
Informática e educação
Informática e educação Informática e educação
Informática e educação
 
Conceptos basicos de las redes
Conceptos basicos de las redesConceptos basicos de las redes
Conceptos basicos de las redes
 
El ser humano y la tecnologia1
El ser humano y la tecnologia1El ser humano y la tecnologia1
El ser humano y la tecnologia1
 
Proyecto de unidad magisterial
Proyecto de unidad magisterialProyecto de unidad magisterial
Proyecto de unidad magisterial
 
Trabajo Colectivo
Trabajo ColectivoTrabajo Colectivo
Trabajo Colectivo
 
Aula bootstrap-carousel
Aula bootstrap-carouselAula bootstrap-carousel
Aula bootstrap-carousel
 
Venezuela
VenezuelaVenezuela
Venezuela
 

Similar to Cyber insurance (linked in) the basics (tcic)

Cyber risk
Cyber riskCyber risk
Cyber risk
Tarek Younan
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
Next Dimension Inc.
 
Cyber liability FINAL
Cyber liability FINALCyber liability FINAL
Cyber liability FINALChris Evans
 
Cyber Threats and Insurance
Cyber Threats and InsuranceCyber Threats and Insurance
Cyber Threats and Insurance
Eric Dean
 
Cyber insurance : Fraud, waste or abuse?
Cyber insurance : Fraud, waste or abuse?Cyber insurance : Fraud, waste or abuse?
Cyber insurance : Fraud, waste or abuse?
Priyanka Aash
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
CBIZ Cyber Liability Flyer
CBIZ Cyber Liability FlyerCBIZ Cyber Liability Flyer
CBIZ Cyber Liability Flyer
CBIZ, Inc.
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
aiimnevada
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
BrianHuntMSFCPACRISC
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
Michael C. Keeling, Esq.
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
SecureDocs
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
Strategic Insurance Software
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
Gloucestershire Professionals
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Citrin Cooperman
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
OCTF Industry Engagement
 
Construction Cyber Risks
Construction Cyber RisksConstruction Cyber Risks
Construction Cyber Risks
Graeme Cross
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
Shantam Goel
 
Risk Management on the Internet
Risk Management on the InternetRisk Management on the Internet
Risk Management on the Internet
sekiur
 
Debunking Myths for Cyber-Insurance
Debunking Myths for Cyber-InsuranceDebunking Myths for Cyber-Insurance
Debunking Myths for Cyber-Insurance
Priyanka Aash
 

Similar to Cyber insurance (linked in) the basics (tcic) (20)

Cyber risk
Cyber riskCyber risk
Cyber risk
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
Cyber liability FINAL
Cyber liability FINALCyber liability FINAL
Cyber liability FINAL
 
Cyber Threats and Insurance
Cyber Threats and InsuranceCyber Threats and Insurance
Cyber Threats and Insurance
 
Cyber insurance : Fraud, waste or abuse?
Cyber insurance : Fraud, waste or abuse?Cyber insurance : Fraud, waste or abuse?
Cyber insurance : Fraud, waste or abuse?
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
CBIZ Cyber Liability Flyer
CBIZ Cyber Liability FlyerCBIZ Cyber Liability Flyer
CBIZ Cyber Liability Flyer
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 
Construction Cyber Risks
Construction Cyber RisksConstruction Cyber Risks
Construction Cyber Risks
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
Risk Management on the Internet
Risk Management on the InternetRisk Management on the Internet
Risk Management on the Internet
 
Debunking Myths for Cyber-Insurance
Debunking Myths for Cyber-InsuranceDebunking Myths for Cyber-Insurance
Debunking Myths for Cyber-Insurance
 

Recently uploaded

Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 

Cyber insurance (linked in) the basics (tcic)

  • 1. CYBER RISKS & CYBER INSURANCE The Cyber Insurance Consultancy Chris Stallard – Chief Insurance Imagineer chris@zemstarinsurance.com.au
  • 2. ‘CYBER’ – WHERE DID IT COME FROM? First coined from Mathematics Professor Norbert Wiener in 1948. Ground breaking account of various systems that led and influenced AI and complex systems. “Cyber” itself is derived from a Greek term meaning ‘steersman’ or ‘governor’ Chris Stallard – Chief Insurance Imagineer chris@zemstarinsurance.com.au
  • 3. A BRIEF HISTORY OF CYBER TIME First policies bound in the US in the late 1990’s Low product evolution due to Y2K and 9/11 2016 - US – Mature UK/Europe – Growing Asia/AU and NZ – Emerging 2008 – Cyber Premiums in region of $500m Circa. 2000 – First Betterley Report on Cyber Insurance 2020 – Global GWP Estimated at $7.5bn to $15bn Chris Stallard – Chief Insurance Imagineer chris@zemstarinsurance.com.au
  • 4. WHY BUY CYBER INSURANCE? •  Privacy Legislation including the Australian Privacy Principles (APPs) •  Forms part of an effective risk management framework •  PCI-DSS obligations •  Ubiquitous exposure - IoT •  Lack of coverage within traditional insurance programs •  Potential for system vulnerabilities •  Benefits of accessing expertise when it is needed •  Bad guys attack weaknesses not strengths Chris Stallard – Chief Insurance Imagineer chris@zemstarinsurance.com.au
  • 5. GREAT NEWS !! – YOU HAVE THE SKILLS TO SELL As an Insurance Professional, you already have risk transfer knowledge. Risk considerations and exposures associated with Cyber are very similar to those that businesses already face. Quite simply, a business faces the impact of a Cyber event on their operations and revenue. In addition to first party exposures they have to third parties (customers primarily). In line with tradition, there will be costs and expenses associated with managing impact: -  including increased costs of working -  business interruption -  defence costs -  investigation costs -  other expenses such as expert services. Chris Stallard – Chief Insurance Imagineer chris@zemstarinsurance.com.au
  • 6. CYBER….YOUR FAMILIAR BUT NEW RISK Fire Damage Business Interruption Event Expenses Third Party Actions E-mail attachment contained the Virus Virus Attack Applications and Data Damage 3 weeks to reconstitute data and 3 months to recover BI Systems & Data recovery experts, Customer comms. Event Expense Customers bring action following exposure of PII Third Party Actions Chris Stallard – Chief Insurance Imagineer chris@zemstarinsurance.com.au
  • 7. CYBER COVERAGE BI Cost to replace, restore (data) from network breach Costs of extortion monies and expenses Business Interruption – loss of income and extra expenses Identity theft Breach of Privacy Failure to protect confidential data Transmission of spyware, viruses & code Notification costs incurred Regulatory Defence costs PR and Crisis Management costs Fine and Penalties 1st Party 3rd Party Costs Damage Event Expense TPAs Event Expense Event Expense Chris Stallard – Chief Insurance Imagineer chris@zemstarinsurance.com.au
  • 8. RISK TRANSFER OR COVER GAP? TRADITIONAL PROGRAM COVERS Versus COVERAGE SHORTFALLS Unlikely that policies will provide cover for data breaches Typically require physical loss or damage and may specifically exclude electronic data Would usually only respond to actions bought against D&Os for ‘Wrongful Act’ Cover is not usually afforded for information/data breaches (unless part of ‘Professional Services) Most Cyber extensions are only as effective as the underlying policy trigger GL D&O /ML PROP PI/ E&O EXTS. Chris Stallard – Chief Insurance Imagineer chris@zemstarinsurance.com.au
  • 9. LOSS SCENARIOS: LOST LAPTOP A laptop which is used by a number of employees is left in a coffee shop in the Sydney CBD. It cannot be located. The Laptop contains 25,000 customers records including names, addresses and banking information. RANSOMWARE A business owner opens their first e-mail of the day.The opening line reads “Your data has been locked by us”. The content is clear, there is a threat that the company data will be erased unless a ransom of 250 Bitcoins is paid. SYSTEMVULNERABILITY Personal and financial information has been obtain via security weaknesses in a computer system. Over 250,000 identities implicated. The Insured was made aware of the breach/es by the Federal Police and immediate cessation of operations is required. Chris Stallard – Chief Insurance Imagineer chris@zemstarinsurance.com.au
  • 10. SCENARIO 1 A company laptop has been left in a coffee shop in the Sydney CBD. It cannot be located. The Laptop contains 25,000 customers records including names, addresses and banking information. LOST LAPTOP Most policies will cover the costs of recovering data (but usually only as a result of a ‘virus’ attack). Policies do not typically cover physical property and the laptop should be insured under a property policy 1st Party Most policies will provide cover for actions bought against the insured for breach or privacy or for damages as a result of personal information impacting a third party e.g. credit history black marks. 3rd Party •  Notifying customers of breach •  Costs of monitoring credit reports •  Defence costs in respect of third party claims or regulatory investigation/action Costs Chris Stallard – Chief Insurance Imagineer chris@zemstarinsurance.com.au
  • 11. SCENARIO 2 Business owner opens an e-mail.The opening line reads “Your data has been locked by us”. There is a threat that the company data will be erased unless a ransom of 250 Bitcoins is paid. RANSOM Extortion threats are usually covered under market forms including the payment of monies to release or prevent data damage. However, the recommendation is that no payment is made, as monies demanded can increase and there is no guarantee that data will be left untouched 1st Party In the event that any PII or PHI is exposed then most policies will respond to actions bought by third parties and/or regulatory authorities 3rd Party •  Costs of monitoring credit reports •  Investigation and virus removal costs •  Defence costs in respect of third party claims or regulatory investigation/action Costs Chris Stallard – Chief Insurance Imagineer chris@zemstarinsurance.com.au
  • 12. SCENARIO 3 Personal and financial information has been obtain via a weaknesses in a computer system. Over 250,000 identities implicated. Federal Police advised insured of the breach and immediate cessation of operations is required. SYSTEM VULNERABILITY Should the investigation result in a material impact to the operations of the business preventing them from operating, some policies do make provision for impact on profit or revenue 1st Party In the event that any PII or PHI is exposed then most policies will respond to actions bought by third parties and/or regulatory authorities. 3rd Party •  Costs of monitoring credit reports •  Investigation and virus removal costs •  Defence costs in respect of third party claims or regulatory investigation/action Costs Chris Stallard – Chief Insurance Imagineer chris@zemstarinsurance.com.au