SlideShare a Scribd company logo
Ignorance is Risk
CYBER INSURANCE
Common Misconceptions About Cyber Insurance
2
“ My company is not exposed to cyber attacks”
“We outsource so I have no risk”
“Cyber attacks are only a problem for big companies”
“Cyber Insurance is too expensive, I have no budget”
Chubb’s Global Cyber Practice
Years of
experience
writing cyber
insurance
Countries
with cyber
policies
Cyber
claims
handled
Chubb
employees in
the global
cyber practice
Million
individuals
notified
following
privacy breach
3
Too small to fail?
Types of
Cyber incidents
experienced by
Companies
4
Chubb’s Reported Incidents by Industry Over the Last Decade
5
Chubb’s Three Year Average Cost of First Party Expenses following a cyber event
6
$29,830
$191,544
$74,337
$56,879
$27,423
$0
$50,000
$100,000
$150,000
$200,000
$250,000
Legal Costs Forensics Notification/Call
Center
Credit Monitoring PR/Crisis Response
63% of Chubb’s reported
incidents are less than 100
compromised records
Chubb’s Exposure
Statistics by Triggers
Over the Last
Decade
7
Human Error, 24%
Hack, 19%
Privacy Violations, 19%
Lost/Stolen Devices, 15%
Phishing, 13%
Malware, 7%
“I’ve got nothing they want”
8
Source: Symantec 2019
Item Cost
▪ Fake ID, Drivers License Passport
▪ Hacked emails accounts
▪ Scans of Real Passports
▪ Custom Malware ( ex banking trojans)
▪ Cash redirector service
▪ Stolen Cloud Accounts
▪ Ransomware toolkit
▪ $25 to $5,000
▪ $1 to $15
▪ $1 to $35
▪ $5 to $200
▪ $5 to 1% of value
▪ $2 to $12
▪ $0 - $250
Cyber Claims Examples and
Incident Response Platform
Cyber Enterprise Risk Management
Case Study 1: Ransomware attack
With the servers down, the Insured
was unable to fulfil their clients’ orders.
Business interruption loss was estimated
to cost over $250,000 a day. The hacker
demanded a ransom to decrypt each
server, with the ransom amount
increasing if payment was not made
within 2 days.
The Insured is a
company operating
in the advertising
industry, with an
annual revenue of
$30 million.
Day of Incident
During the weekend,
a malicious file infected the
company's servers and all files
including artwork, historic and
current project data were affected.
The Insured reported
the incident, and
spoke to the Incident
Response Manager
on the same day.
An IT forensics firm
was deployed
immediately.
Chubb's Incident Response
Team assisted the Insured with
a mitigation strategy by
identifying less business-critical
servers that could be restored
from backups, and negotiating
the ransom amount to release
business-critical servers.
10 Days from Incident
100% of operations restored.
The IT Forensics provided an
incident report to the Insured,
with recommendations to
improve cyber security and
prevent future incidents.
Legal advisors assisted
the Insured with the
filing of a formal
criminal complaint as
well as other regulatory
documentations.
3 Days from Incident
The response team removed the
ransomware from the affected servers,
allowing the company to operate at
70% of typical capacity. The response
team also engaged a crisis management
firm to assist with client communications.
This cyber incident was reported through Chubb's 24/7/365 Cyber Alert mobile application,
and the following stakeholders were activated to provide a holistic response to the Insured's
cyber incident.
Legal and Regulatory
Advice
IT Forensics
Crisis Management
Firm
Forensic
Accounting
Report Incident
Cyber Alert
Incident Response Manager
13
Case Study 2: Ransomware Attack, infected local drives
Description of Event
A construction company that outsourced its IT operations suffered a
ransomware attack because an employee clicked a malicious email
link, causing the company’s customer and project data to be encrypted.
The ransomware infected local hard drives and data that was backed
up online. Without access to the digital records, the company could not
operate its business as usual. Due to the failed attempts to negotiate
with the extortionist, additional costs were incurred to re-construct
and re-enter customer project records. This resulted in significant
downtime and major loss incurred to the business.
Coverage Triggers: Ransomware, Incident Response Expenses,
Data Asset Loss, Business Interruption
Client Profile
Location:
Singapore
Industry:
Construction
Revenue:
S$5 million
14
Case Study 3: Laptop Stolen Results In Invasion of Privacy
Description of event:
An energy company executive’s laptop was stolen from a corporate vehicle. The laptop
contained significant private customer and employee information. Although the file was
encrypted, the overall password protection on the laptop was weak and the PIN for accessing
the encrypted information was compromised.
Resolution:
After assessing the nature of the information on the laptop with a forensic expert and outside
compliance counsel at a cost of $50,000, the energy company voluntarily notified relevant
customers and employees and afforded call centre, monitoring, and restoration services, as
appropriate. While the additional first-party cost was $100,000, the energy company also
incurred $75,000 in expenses responding to a multi-state regulatory investigation. Ultimately,
the company was fined $100,000 for deviating from its publicly stated privacy policy
Coverage triggers: Incident Response Expenses, Data Asset Loss, Privacy Liability,
Business Interruption, Recovery Costs, Regulatory investigation, Potential Payment Card Loss
Client Profile
Location:
Singapore
Industry:
Energy Firm
Revenue:
S$20 million
Number of
Employees:
100
Case Study 4: Unauthorised Access - Employee Accesses HR Site, Sells
Personal Information
December, 2020
Client Profile
Location:
Singapore
Industry:
Professional
Services Firm
Revenue:
S$7.5mil
15
Description of event:
A rogue employee accessed the human resource platform of a
professional service provider. The employee acquired and sold social
security information on the black market before being apprehended
by law enforcement. Thereafter, several cases of identity theft were
perpetrated against the professional service provider’s employees.
Resolution:
The professional service provider engaged a forensics investigator and
outside compliance counsel. It also notified employees of the breach,
established a call centre, and provided monitoring and restoration
services to impacted employees.
Client Profile
Location:
Hong Kong
Industry: Hospitality
Revenue:
US$150k - US$200k
Case Study 5: Human Error
November 25, 2020
16
• The Insured outsources its data hosting to a third party company.
• One evening, before heading home, an engineer at the hosting location
turned off the Insured’s firewall, by accident
• The firewall remained turned off for a little over 12 hours, causing a
number of servers to malfunction, which led to discovery of the error
Situation
• The Insured’s broker notified Chubb directly.
• The Insured provided a project brief outlining the work that had to be
done (including forced shutdown to isolate the potential areas of
damage, installation and migration to a new host and determining the
extent of any malware attack)
• They sought Chubb’s assistance with identifying a suitable vendor and
agreement to the brief/budget
Activation
November 25, 2020
17
Response & Coverage
Chubb acknowledged
notification from
broker immediately,
and advised next steps.
Following a sweep, it
was found that no
malware had been
introduced.
Focus was on restoring
the data lost due to the
malfunctioning servers,
which data was
restored mainly via the
Insured’s backup
server.
Insured chose to use
their own legal vendor
to assist with
regulatory compliance
requirements,
including notification
of the incident to the
authorities.
Policy responded to
cover:
• Incident Response
Expenses
• Data & System
Recovery costs
Chubb’s Cyber Incident Response Platform
18
Call our Hotline 24/7/365
Guaranteed response
Client report cyber event using any of the following methods
Insurance Coverage
There are first party and third party covers
Data and System Recovery **
Increased cost of work and other costs
to recover data, repair or restore software,
identify and remove malware, and to
recover business operations.
> Triggered by Business Interruption Incident.
FirstParty
ThirdParty
Business Interruption **
Covers loss of net profit and continuing
operating and payroll expenses.
> Triggered by Business Interruption Incident.
Cyber Extortion
Covers a cyber extortion payment and
the cost to hire a crisis negotiation
specialist.
> Triggered by Cyber Extortion.
Privacy & Network Security Liability **
Defence and damages for claims arising from:
• Duty to maintain confidentiality of personal
or corporate information
• Duty to maintain a secure network for
third parties
Media Liability **
Defence and damages for
claims arising from improper
online media activity.
Incident Response
Costs to mitigate any cyber incident:
• Incident Response Manager
• IT Forensics
• Legal Advice
• Notification
• Fraud Restoration
• Call Centre
• Public Relations
To be insured, or not?
59% do not
fully understand
the insurance
solutions available.
62% have never
purchased cyber
insurance before
or after an incident.
The role of Insurance
53%
would value
having a hands-on
response service.
54%
would value the
ability to identify and
minimise the impact
of a cyber incident.
20
Chubb. Insured.

More Related Content

What's hot

You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...Michael Noel
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Securitykailash shaw
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationJacqueline Fick
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexKanishka Ramyar
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016Shannon G., MBA
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiKnowledge Group
 
Aon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesCSNP
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsIBM Security
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
 
Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorFarook Al-Jibouri
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionNext Dimension Inc.
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersMerry D'souza
 

What's hot (20)

Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence Index
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
Aon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation Strategies
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial Sector
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
 

Similar to Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cyber Insurance

Infocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationInfocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationEthos Media S.A.
 
Eliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber InsuranceEliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber InsuranceInternetwork Engineering (IE)
 
Exeter - Cyber Security Breakfast Briefing
Exeter - Cyber Security Breakfast BriefingExeter - Cyber Security Breakfast Briefing
Exeter - Cyber Security Breakfast BriefingPKF Francis Clark
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Michael C. Keeling, Esq.
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021lior mazor
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftCBIZ, Inc.
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guideJoAnna Cheshire
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
How to Use a Cyber Loss Model within a Retail Bank
How to Use a Cyber Loss Model within a Retail BankHow to Use a Cyber Loss Model within a Retail Bank
How to Use a Cyber Loss Model within a Retail BankThomas Lee
 
Cyber Risk and Marine Insurance
Cyber Risk and Marine InsuranceCyber Risk and Marine Insurance
Cyber Risk and Marine InsurancePeter Hulyer
 
Cyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryCyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryHNI Risk Services
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxcaniceconsulting
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationEric Reehl
 

Similar to Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cyber Insurance (20)

Cyber
Cyber Cyber
Cyber
 
Captive Insurance and Cyber Risk
Captive Insurance and Cyber RiskCaptive Insurance and Cyber Risk
Captive Insurance and Cyber Risk
 
B crisis
B crisisB crisis
B crisis
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Infocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationInfocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar Presentation
 
Eliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber InsuranceEliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber Insurance
 
Exeter - Cyber Security Breakfast Briefing
Exeter - Cyber Security Breakfast BriefingExeter - Cyber Security Breakfast Briefing
Exeter - Cyber Security Breakfast Briefing
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
How to Use a Cyber Loss Model within a Retail Bank
How to Use a Cyber Loss Model within a Retail BankHow to Use a Cyber Loss Model within a Retail Bank
How to Use a Cyber Loss Model within a Retail Bank
 
Cyber Risk and Marine Insurance
Cyber Risk and Marine InsuranceCyber Risk and Marine Insurance
Cyber Risk and Marine Insurance
 
Cyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryCyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation Industry
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptx
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and Preparation
 

More from Netpluz Asia Pte Ltd

Secure & Protect your Data with Druva
Secure & Protect your Data with Druva Secure & Protect your Data with Druva
Secure & Protect your Data with Druva Netpluz Asia Pte Ltd
 
Simplifying Communication with Microsoft Teams & Netpluz SIP Trunk
Simplifying Communication with Microsoft Teams & Netpluz SIP TrunkSimplifying Communication with Microsoft Teams & Netpluz SIP Trunk
Simplifying Communication with Microsoft Teams & Netpluz SIP TrunkNetpluz Asia Pte Ltd
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...Netpluz Asia Pte Ltd
 
eSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform SimplifiedeSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform SimplifiedNetpluz Asia Pte Ltd
 
Using a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkUsing a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkNetpluz Asia Pte Ltd
 
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz Asia Pte Ltd
 
Netpluz - Managed Firewall & Endpoint Protection
Netpluz - Managed Firewall & Endpoint Protection Netpluz - Managed Firewall & Endpoint Protection
Netpluz - Managed Firewall & Endpoint Protection Netpluz Asia Pte Ltd
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
Netpluz Managed Services Portfolio
Netpluz Managed Services PortfolioNetpluz Managed Services Portfolio
Netpluz Managed Services PortfolioNetpluz Asia Pte Ltd
 
Y5Zone Singapore - Wifi Advertisement & EDM services
Y5Zone Singapore - Wifi Advertisement & EDM services Y5Zone Singapore - Wifi Advertisement & EDM services
Y5Zone Singapore - Wifi Advertisement & EDM services Netpluz Asia Pte Ltd
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Netpluz Asia Pte Ltd
 
Email Phishing Test Simulation, Educating the Users
Email Phishing Test Simulation, Educating the UsersEmail Phishing Test Simulation, Educating the Users
Email Phishing Test Simulation, Educating the UsersNetpluz Asia Pte Ltd
 
The Best Just Got Better, Intercept X Now With EDR
The Best Just Got Better, Intercept X Now With EDRThe Best Just Got Better, Intercept X Now With EDR
The Best Just Got Better, Intercept X Now With EDRNetpluz Asia Pte Ltd
 
Understanding the Threat Landscape by SOPHOS
Understanding the Threat Landscape by SOPHOSUnderstanding the Threat Landscape by SOPHOS
Understanding the Threat Landscape by SOPHOSNetpluz Asia Pte Ltd
 

More from Netpluz Asia Pte Ltd (20)

Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020
 
Secure & Protect your Data with Druva
Secure & Protect your Data with Druva Secure & Protect your Data with Druva
Secure & Protect your Data with Druva
 
The State of Ransomware 2020
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020
 
Simplifying Communication with Microsoft Teams & Netpluz SIP Trunk
Simplifying Communication with Microsoft Teams & Netpluz SIP TrunkSimplifying Communication with Microsoft Teams & Netpluz SIP Trunk
Simplifying Communication with Microsoft Teams & Netpluz SIP Trunk
 
SAY HELLO TO MICROSOFT TEAMS
SAY HELLO TO MICROSOFT TEAMSSAY HELLO TO MICROSOFT TEAMS
SAY HELLO TO MICROSOFT TEAMS
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
 
eSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform SimplifiedeSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform Simplified
 
Using a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkUsing a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business network
 
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security
 
Netpluz - Managed Firewall & Endpoint Protection
Netpluz - Managed Firewall & Endpoint Protection Netpluz - Managed Firewall & Endpoint Protection
Netpluz - Managed Firewall & Endpoint Protection
 
Netpluz Managed Cyber Security
Netpluz Managed Cyber Security Netpluz Managed Cyber Security
Netpluz Managed Cyber Security
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
SME Cyber Insurance
SME Cyber Insurance SME Cyber Insurance
SME Cyber Insurance
 
Netpluz Managed Services Portfolio
Netpluz Managed Services PortfolioNetpluz Managed Services Portfolio
Netpluz Managed Services Portfolio
 
Y5Zone Singapore - Wifi Advertisement & EDM services
Y5Zone Singapore - Wifi Advertisement & EDM services Y5Zone Singapore - Wifi Advertisement & EDM services
Y5Zone Singapore - Wifi Advertisement & EDM services
 
Getting ready for wi-fi 6 and IOT
Getting ready for wi-fi 6 and IOTGetting ready for wi-fi 6 and IOT
Getting ready for wi-fi 6 and IOT
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
 
Email Phishing Test Simulation, Educating the Users
Email Phishing Test Simulation, Educating the UsersEmail Phishing Test Simulation, Educating the Users
Email Phishing Test Simulation, Educating the Users
 
The Best Just Got Better, Intercept X Now With EDR
The Best Just Got Better, Intercept X Now With EDRThe Best Just Got Better, Intercept X Now With EDR
The Best Just Got Better, Intercept X Now With EDR
 
Understanding the Threat Landscape by SOPHOS
Understanding the Threat Landscape by SOPHOSUnderstanding the Threat Landscape by SOPHOS
Understanding the Threat Landscape by SOPHOS
 

Recently uploaded

The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementBojamma2
 
HR and Employment law update: May 2024.
HR and Employment law update:  May 2024.HR and Employment law update:  May 2024.
HR and Employment law update: May 2024.FelixPerez547899
 
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptxUnveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptxmy Pandit
 
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdfSOFTTECHHUB
 
Using Generative AI for Content Marketing
Using Generative AI for Content MarketingUsing Generative AI for Content Marketing
Using Generative AI for Content MarketingChuck Aikens
 
TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024Adnet Communications
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...BBPMedia1
 
Did Paul Haggis Ever Win an Oscar for Best Filmmaker
Did Paul Haggis Ever Win an Oscar for Best FilmmakerDid Paul Haggis Ever Win an Oscar for Best Filmmaker
Did Paul Haggis Ever Win an Oscar for Best Filmmakerstajohn447
 
Luxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
Luxury Artificial Plants Dubai | Plants in KSA, UAE | ShajaraLuxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
Luxury Artificial Plants Dubai | Plants in KSA, UAE | ShajaraShajara Artificial Plants
 
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...Rahul Bedi
 
Cracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptxCracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptxWorkforce Group
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...BBPMedia1
 
IPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best ServiceIPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best ServiceDragon Dream Bar
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowMiriam Robeson
 
The Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdfThe Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdfMont Surfaces
 
New Product Development.kjiy7ggbfdsddggo9lo
New Product Development.kjiy7ggbfdsddggo9loNew Product Development.kjiy7ggbfdsddggo9lo
New Product Development.kjiy7ggbfdsddggo9logalbokkahewagenitash
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdfDerekIwanaka1
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfHenry Tapper
 
Evolution and Growth of Supply chain.pdf
Evolution and Growth of Supply chain.pdfEvolution and Growth of Supply chain.pdf
Evolution and Growth of Supply chain.pdfGutaMengesha1
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptseri bangash
 

Recently uploaded (20)

The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
HR and Employment law update: May 2024.
HR and Employment law update:  May 2024.HR and Employment law update:  May 2024.
HR and Employment law update: May 2024.
 
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptxUnveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
 
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
 
Using Generative AI for Content Marketing
Using Generative AI for Content MarketingUsing Generative AI for Content Marketing
Using Generative AI for Content Marketing
 
TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Did Paul Haggis Ever Win an Oscar for Best Filmmaker
Did Paul Haggis Ever Win an Oscar for Best FilmmakerDid Paul Haggis Ever Win an Oscar for Best Filmmaker
Did Paul Haggis Ever Win an Oscar for Best Filmmaker
 
Luxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
Luxury Artificial Plants Dubai | Plants in KSA, UAE | ShajaraLuxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
Luxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
 
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
 
Cracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptxCracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptx
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
IPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best ServiceIPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best Service
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to Know
 
The Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdfThe Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdf
 
New Product Development.kjiy7ggbfdsddggo9lo
New Product Development.kjiy7ggbfdsddggo9loNew Product Development.kjiy7ggbfdsddggo9lo
New Product Development.kjiy7ggbfdsddggo9lo
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
Evolution and Growth of Supply chain.pdf
Evolution and Growth of Supply chain.pdfEvolution and Growth of Supply chain.pdf
Evolution and Growth of Supply chain.pdf
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 

Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cyber Insurance

  • 2. Common Misconceptions About Cyber Insurance 2 “ My company is not exposed to cyber attacks” “We outsource so I have no risk” “Cyber attacks are only a problem for big companies” “Cyber Insurance is too expensive, I have no budget”
  • 3. Chubb’s Global Cyber Practice Years of experience writing cyber insurance Countries with cyber policies Cyber claims handled Chubb employees in the global cyber practice Million individuals notified following privacy breach 3
  • 4. Too small to fail? Types of Cyber incidents experienced by Companies 4
  • 5. Chubb’s Reported Incidents by Industry Over the Last Decade 5
  • 6. Chubb’s Three Year Average Cost of First Party Expenses following a cyber event 6 $29,830 $191,544 $74,337 $56,879 $27,423 $0 $50,000 $100,000 $150,000 $200,000 $250,000 Legal Costs Forensics Notification/Call Center Credit Monitoring PR/Crisis Response 63% of Chubb’s reported incidents are less than 100 compromised records
  • 7. Chubb’s Exposure Statistics by Triggers Over the Last Decade 7 Human Error, 24% Hack, 19% Privacy Violations, 19% Lost/Stolen Devices, 15% Phishing, 13% Malware, 7%
  • 8. “I’ve got nothing they want” 8 Source: Symantec 2019 Item Cost ▪ Fake ID, Drivers License Passport ▪ Hacked emails accounts ▪ Scans of Real Passports ▪ Custom Malware ( ex banking trojans) ▪ Cash redirector service ▪ Stolen Cloud Accounts ▪ Ransomware toolkit ▪ $25 to $5,000 ▪ $1 to $15 ▪ $1 to $35 ▪ $5 to $200 ▪ $5 to 1% of value ▪ $2 to $12 ▪ $0 - $250
  • 9. Cyber Claims Examples and Incident Response Platform
  • 10. Cyber Enterprise Risk Management Case Study 1: Ransomware attack With the servers down, the Insured was unable to fulfil their clients’ orders. Business interruption loss was estimated to cost over $250,000 a day. The hacker demanded a ransom to decrypt each server, with the ransom amount increasing if payment was not made within 2 days. The Insured is a company operating in the advertising industry, with an annual revenue of $30 million. Day of Incident During the weekend, a malicious file infected the company's servers and all files including artwork, historic and current project data were affected. The Insured reported the incident, and spoke to the Incident Response Manager on the same day. An IT forensics firm was deployed immediately.
  • 11. Chubb's Incident Response Team assisted the Insured with a mitigation strategy by identifying less business-critical servers that could be restored from backups, and negotiating the ransom amount to release business-critical servers. 10 Days from Incident 100% of operations restored. The IT Forensics provided an incident report to the Insured, with recommendations to improve cyber security and prevent future incidents. Legal advisors assisted the Insured with the filing of a formal criminal complaint as well as other regulatory documentations. 3 Days from Incident The response team removed the ransomware from the affected servers, allowing the company to operate at 70% of typical capacity. The response team also engaged a crisis management firm to assist with client communications.
  • 12. This cyber incident was reported through Chubb's 24/7/365 Cyber Alert mobile application, and the following stakeholders were activated to provide a holistic response to the Insured's cyber incident. Legal and Regulatory Advice IT Forensics Crisis Management Firm Forensic Accounting Report Incident Cyber Alert Incident Response Manager
  • 13. 13 Case Study 2: Ransomware Attack, infected local drives Description of Event A construction company that outsourced its IT operations suffered a ransomware attack because an employee clicked a malicious email link, causing the company’s customer and project data to be encrypted. The ransomware infected local hard drives and data that was backed up online. Without access to the digital records, the company could not operate its business as usual. Due to the failed attempts to negotiate with the extortionist, additional costs were incurred to re-construct and re-enter customer project records. This resulted in significant downtime and major loss incurred to the business. Coverage Triggers: Ransomware, Incident Response Expenses, Data Asset Loss, Business Interruption Client Profile Location: Singapore Industry: Construction Revenue: S$5 million
  • 14. 14 Case Study 3: Laptop Stolen Results In Invasion of Privacy Description of event: An energy company executive’s laptop was stolen from a corporate vehicle. The laptop contained significant private customer and employee information. Although the file was encrypted, the overall password protection on the laptop was weak and the PIN for accessing the encrypted information was compromised. Resolution: After assessing the nature of the information on the laptop with a forensic expert and outside compliance counsel at a cost of $50,000, the energy company voluntarily notified relevant customers and employees and afforded call centre, monitoring, and restoration services, as appropriate. While the additional first-party cost was $100,000, the energy company also incurred $75,000 in expenses responding to a multi-state regulatory investigation. Ultimately, the company was fined $100,000 for deviating from its publicly stated privacy policy Coverage triggers: Incident Response Expenses, Data Asset Loss, Privacy Liability, Business Interruption, Recovery Costs, Regulatory investigation, Potential Payment Card Loss Client Profile Location: Singapore Industry: Energy Firm Revenue: S$20 million Number of Employees: 100
  • 15. Case Study 4: Unauthorised Access - Employee Accesses HR Site, Sells Personal Information December, 2020 Client Profile Location: Singapore Industry: Professional Services Firm Revenue: S$7.5mil 15 Description of event: A rogue employee accessed the human resource platform of a professional service provider. The employee acquired and sold social security information on the black market before being apprehended by law enforcement. Thereafter, several cases of identity theft were perpetrated against the professional service provider’s employees. Resolution: The professional service provider engaged a forensics investigator and outside compliance counsel. It also notified employees of the breach, established a call centre, and provided monitoring and restoration services to impacted employees.
  • 16. Client Profile Location: Hong Kong Industry: Hospitality Revenue: US$150k - US$200k Case Study 5: Human Error November 25, 2020 16 • The Insured outsources its data hosting to a third party company. • One evening, before heading home, an engineer at the hosting location turned off the Insured’s firewall, by accident • The firewall remained turned off for a little over 12 hours, causing a number of servers to malfunction, which led to discovery of the error Situation • The Insured’s broker notified Chubb directly. • The Insured provided a project brief outlining the work that had to be done (including forced shutdown to isolate the potential areas of damage, installation and migration to a new host and determining the extent of any malware attack) • They sought Chubb’s assistance with identifying a suitable vendor and agreement to the brief/budget Activation
  • 17. November 25, 2020 17 Response & Coverage Chubb acknowledged notification from broker immediately, and advised next steps. Following a sweep, it was found that no malware had been introduced. Focus was on restoring the data lost due to the malfunctioning servers, which data was restored mainly via the Insured’s backup server. Insured chose to use their own legal vendor to assist with regulatory compliance requirements, including notification of the incident to the authorities. Policy responded to cover: • Incident Response Expenses • Data & System Recovery costs
  • 18. Chubb’s Cyber Incident Response Platform 18 Call our Hotline 24/7/365 Guaranteed response Client report cyber event using any of the following methods
  • 19. Insurance Coverage There are first party and third party covers Data and System Recovery ** Increased cost of work and other costs to recover data, repair or restore software, identify and remove malware, and to recover business operations. > Triggered by Business Interruption Incident. FirstParty ThirdParty Business Interruption ** Covers loss of net profit and continuing operating and payroll expenses. > Triggered by Business Interruption Incident. Cyber Extortion Covers a cyber extortion payment and the cost to hire a crisis negotiation specialist. > Triggered by Cyber Extortion. Privacy & Network Security Liability ** Defence and damages for claims arising from: • Duty to maintain confidentiality of personal or corporate information • Duty to maintain a secure network for third parties Media Liability ** Defence and damages for claims arising from improper online media activity. Incident Response Costs to mitigate any cyber incident: • Incident Response Manager • IT Forensics • Legal Advice • Notification • Fraud Restoration • Call Centre • Public Relations
  • 20. To be insured, or not? 59% do not fully understand the insurance solutions available. 62% have never purchased cyber insurance before or after an incident. The role of Insurance 53% would value having a hands-on response service. 54% would value the ability to identify and minimise the impact of a cyber incident. 20