SlideShare a Scribd company logo
1 of 25
Download to read offline
Presentation at IS Directors Conference | Interlaken - 18 September 2015 1
Cyber Insurance
a time journey, the past, the
present and a glimpse at the
future
Presentation IS Directors Forum 2015 –
Interlaken
by Philippe Aerni & Willy Stössel
Presentation at IS Directors Conference | Interlaken - 18 September 2015 2
Table of Contents
Introduction
Coverage and Services provided
Loss Examples and Scenarios
Underwriting Criteria for Risk Selection
Outlook
Presentation at IS Directors Conference | Interlaken - 18 September 2015
• Swiss Re Corporate Solutions has been underwriting Technology E&O (TMT
– Technology, Media & Telecom) since 2001
• Cyber liability extensions and all 1st party extensions have been added over
the years to all Technology E&O policies in the US market
• Swiss Re Corporate Solutions has dedicated Underwriters for this line of
business in
– New York
– London
– Zurich
– Paris
• Swiss Re Corporate Solutions Risk Engineering and Group Risk
Management & Information Security support Underwriters for the risk
assessment
Swiss Re Corporate Solutions Approach
Underwriting Technology E&O and Cyber Insurance
3
Presentation at IS Directors Conference | Interlaken - 18 September 2015
(Source: copyright protection may apply, source unknown)
Cyber Risks
Nightmare or Opportunity?
4
Presentation at IS Directors Conference | Interlaken - 18 September 2015 5
Coverage and Services provided
Presentation at IS Directors Conference | Interlaken - 18 September 2015
 


5 facts about the Cyber insurance market
6
USD 1.5-2b2014 worldwide estimated premium
2013: ~ USD 1.2b
2012: ~ USD 800m
Competitive
ratesas carriers try to defend
or gain market share
Full limitsavailable for coverages sub-limited before
Healthcareis the fastest growing Cyber
insurance buying segment
North Americahas the highest demand for Cyber insurance globally
Europe: low-mid demand will be driven by regulation
Presentation at IS Directors Conference | Interlaken - 18 September 2015
The Cyber Risk Landscape
7
Presentation at IS Directors Conference | Interlaken - 18 September 2015
Insurance Cover Landscape
Traditional Policies vs specific Cyber Policies
Tech, Media &Telecom
(E&O)
CyberGL
PD/BI &
Crime
Libel
Slander
Defamation
* excluded from standard product
8
PD / BI
Requires
"direct physical
loss” -> not
satisfied
Crime: requires
intent and only
covers money,
securities, and
tangible
property
IP
Infringement
Copyright
Trademark
Patent *
Errors &
Omissions
Tech Services
Tech Products
Unintentional
Disclosure
Unintentional
Breach of
Privacy Policy
Breach of
Confidentiality
Investigation
costs
Notification
costs
Fines/Penalties
Business
Interruption
Extortion
moneys
Privacy First PartyMitigation
Advertisement
Personal
Injury
Property/
Crime
Existing Policy Landscape New Policy Landscape
Presentation at IS Directors Conference | Interlaken - 18 September 2015 9
Cyber insurance
First Party / ISBI*
 Unauthorized access
 Hacking
 Virus
 Denial of Service
CommentProduct The current market offering includes First Party/ISBI, extortion and privacy coverage
Extortion
 Investigation costs
 Extortion of monies due to
credible threat e.g., introduction
of malicious code
Privacy
 Unintentional disclosure
 Breach of confidentiality
 Business Interruption or
loss of data due to a general
malicious attack (e.g., generic
virus: love bug virus)
 Contingent Business
Interruption due to lack of
internet connectivity caused
by IT failure at providers'
location
 Costs for reinstatement of
data
 Investigation costs to
determine cause of security
failure
 Covers the monies paid by
the insured as a result of a
credible threat/series of
related threats directed at
the Insured
 e.g., to corrupt, damage or
destroy the Insured's
computer system, or to restrict
or hinder access to the
Insured's computer system
 e.g., to release, divulge,
disseminate, destroy or use
confidential information
stored in the Insured's
computer system
 Liability: the defence and
settlement costs for the
liability of the insured arising
out of its failure to adequately
protect its private data
 Remediation: the response
costs following a data breach,
including investigation, public
relations, customer
notification and credit
monitoring
 Fines and/or penalties: the
costs to defend, settle fines
and penalties that may be
assessed by the regulator
Current market offering
*Stand-alone property/extensions to property
Presentation at IS Directors Conference | Interlaken - 18 September 2015 10
1
Bodily injury/ Property damage
 Current cover extends to economic loss only following a cyber event
 Clear differentiation to existing PD/BI products (Property/Casualty)
 New: AIG offers this coverage as a DIC/DIL coverage sitting excess of scheduled
policies
2 Patent Infringement plus theft of trade secrets
 Undesired and hard to insure/quantify coverage
3 Fines & Penalties
 Other than Data Protection fines following a breach
4
War, invasion, act of foreign enemy, hostilities or war-like operations
(whether declared or not), civil war, mutiny, civil commotion
 Coverage is provided for act of cyber terrorism
5 Any seizure, confiscation, nationalization or destruction of a Computer
System or electronic data by order of any governmental or public authority
6 Force Majeure
 Earthquake, volcanic eruption, tidal waves etc
Overview of major market exclusions
Presentation at IS Directors Conference | Interlaken - 18 September 2015
• Traditional insurance policies provide limited coverage only for cyber
attacks:
Gaps in existing traditional policies
11
Presentation at IS Directors Conference | Interlaken - 18 September 2015 12
Breach
notification /
consultation
Forensics
Breach
consultation
Notification
design
Public
relations
 First point of contact
will be Swiss Re and
our external "Data
Breach Counsel." This
will be coordinated
through NetDiligence
platform
 Five hour initial
consultation from
Data Breach counsel
 Facts gathered will
allow Swiss Re assess
if true breach has
occurred
 Without first point of
contact materials may
be discoverable
 Retention of
Forensic
services:
 To contain the
breach
 To understand
the scope and
breadth of
breach
 Review of forensic
materials
 When and where
are breach
notifications
required?
 What is the
potential for
regulatory fines or
penalties?
 What is the
potential for legal
action?
 What are the next
steps?
 Craft letter to
Attorneys General
and other state
and federal
agencies
 Craft letters to be
sent to affected
parties
 Craft speech and
flow chart for call
centers and
potential credit
monitoring
companies
 Engage public
relations and crisis
management
experts to work
with Swiss Re
Claims and Data
Breach Counsel
during course of
breach
Post-breach services to be delivered by a Primary
Insurance Carrier
Cyber breach response – process overview and key considerations
Presentation at IS Directors Conference | Interlaken - 18 September 2015
Potential Risk Event Likelihood Potential impact
Website/copyright /trademark infringement
claims
Low Low
Legal Liability to other for computer security
breaches
Low – Medium Medium
Legal Liability to others for privacy breaches Low – Medium Medium
Privacy breach notification costs & credit
monitoring
Low – Medium Medium
Privacy regulatory action defense and fines Low Medium
Costs to repair damage to your information
assets
Low Medium
Loss of revenue due to a failure of security at a
dependent technology provider
Low Medium
Cyber Extortion threat Low Medium
Loss of revenue resulting from non-physical
business interruption
Low – Medium High
Risk identification – Europe
13
Presentation at IS Directors Conference | Interlaken - 18 September 2015 14
Loss Examples
Examples of large losses US and not only in the US
Security Breaches / Data Breaches – type of losses
Presentation at IS Directors Conference | Interlaken - 18 September 2015 15
Centcom Twitter Youtube
Breach
Anthem BC/BS
 Nr 2 Healthcare insurer in the US
 50 million PII records breached
 Excess of 80 m records stolen
 Notification costs will hit the
existing cyber tower: USD 100m -
for at least USD 120m
[Jan 2015]
Recent examples of data-loss incidents 
Twitter & YouTube accounts hacked
and pro-ISIS content uploaded
[Jan 2015]
Morgan Stanley
Insider attack compromising 3.5m customer
accounts
[Dec 2014]
Sony PSN/Microsoft Xbox Live
Network
DOS attack by hacker group (Lizard
squad) shut down service around
Xmas holidays
[Dec 2014]
 Sony has booked USD 171m in data breach direct costs to date*
 Target has incurred USD 178m in breach related expenses as of Nov 2014**
 Heartland payment systems paid USD 150m in fines and legal costs from
breach and suffered damage to its reputation as a payment processor ***
* PropertyCasualty360 ** New York Times *** The Wall Street Journal
Presentation at IS Directors Conference | Interlaken - 18 September 2015
Korea's financial regulators are coming down hard on three credit card companies whose customer data was stolen in the largest personal information
leak in the country's history. The Financial Services Commission and the Financial Supervisory Service will suspend the business operations of KB
Kookmin Card, NH Nonghyup Card and Lotte Card for three months starting February 17th 2014. Under the terms of the suspension, the companies will be banned from
taking on new customers, issuing card loans or processing cash advances. Existing customers, however, will not be affected as the suspension does not ban the firms from
providing financial services to them. .. Last month's leak, which affected at least 20 million people, sparked concerns the data could
have ended up in the hands of scammers. The estimated compensation for mental damage caused to customers is expected to reach nearly $160 Mio. As
another part of the punishment, the CEOs of the three firms are to face punishment depending on their accountability. source:
…...Connie Kim, Arirang News.
DigiNotar (September 2011), was a Dutch certificate authority, after it had become clear that a
security breach had resulted in the fraudulent issuing of certificates, the Dutch government took
over operational management of DigiNotar's systems. The company was declared bankrupt.
Cyberattacks on critical infrastructure are a reality and they're becoming more frequent. An IT
security report for 2014 published by Germany's Federal Office for Information Security (BSI) …
incident that caused physical damage to a facility. …An attack launched by an advanced persistent
threat (APT) group against an unnamed steel plant in Germany resulted in significant damage,
according a new report.
Areva – Theft of IP, alleged state sponsored attack
Orange France: hacked twice in 2014, release of 1 mil plus customer data.
Security Breaches / Data Breach
Not only US losses (source: various articles)
16
Presentation at IS Directors Conference | Interlaken - 18 September 2015 17
Underwriting Criteria for Risk
Selection
Presentation at IS Directors Conference | Interlaken - 18 September 2015 18
Are you ready to respond to breaches?





Are breach response
procedures set up?
Are roles and
responsibilities assigned?
Are monitoring and
detection measures in
place?
Are immediate measures
instituted to protect data?
Are investigation
resources available to
analyse breaches?
Are response and
notification measures
established?
Are communication
processes established?
Presentation at IS Directors Conference | Interlaken - 18 September 2015
Swiss Re Corso: IBM and Swiss Re teaming up to
offer cyber risk protection services for commercial
customers
19
Swiss Re’s Business Challenge
• Entering new market – wanted to partner with experienced cyber security experts
• Focus enterprises, across the globe for four types of exposures: computer viruses, hacking, Distributed Denial of
Service or malware
Joint Approach
• Comprehensive support
provided by a trusted
partner: from training and
cyber education through
security risk assessments
and vulnerability scans to
cyber claims assistance
Swiss Re`s Benefits
• Immediate access to world class
expertise and experience of the global
security leader – attractive value
proposition to prospective customers
• Integration of cyber assessments
and claims handling into overall
Swiss Re`s business processes
– leverage of best practices
Swiss Re
IBM Applicant
Presentation at IS Directors Conference | Interlaken - 18 September 2015
IBM Cyber Security - Global reach and capabilities
with local presence
20
Presentation at IS Directors Conference | Interlaken - 18 September 2015 21
Outlook
Presentation at IS Directors Conference | Interlaken - 18 September 2015
Driving Factors for Cyber Insurance
A Constantly Changing World
22
New
Technology
Legal
Environment
Accumulation
issues
Supply Chain
M&A
Growth
Plans
Complexity
Cloud
Computing
"underestimated"
small exposure
Connectivity
Known
VulnerabilitiesAwareness &
Litigation
approach
Business
Strategy
Hacker
Focus
Company X
Standardization
Presentation at IS Directors Conference | Interlaken - 18 September 2015
• North America
– Canada
– Mexico
– United States (different
legislation applies for certain
industries and notification
required in > 46 states)
• Central & South America
– Argentina
– Brazil (Pending)
– Chile
– Colombia
– Costa Rica
– Ecuador (Pending)
– Paraguay
– Peru
– Uruguay
• Middle East
– Israel
– UAE (DIFC)
Countries with Privacy/Data Protection Laws
 Africa
– South Africa
– Tunisia
 Asia-Pacific
– Australia
– China (draft privacy
guidelines)
– Hong Kong
– India (privacy rules explained)
– Japan
– Malaysia
– New Zealand
– Philippines
– Singapore
– South Korea
– Taiwan
– Thailand
– Vietnam
 Europe
– 27 EU Member States +
– Norway
– Russia
– Serbia
– Switzerland
– Turkey (Pending)
– Ukraine
EU Data Protection reform –
(Regulation):
revised version going to parliament
after 21.10.2013 committee review,
fines of up to EUR 100 Mio or 5% of
annual worldwide turnover,
whichever is greater
Update: Discussions also impacted
by TTIP, heavily delayed
There are 105 countries with existing or pending privacy or data protection legislation
Presentation at IS Directors Conference | Interlaken - 18 September 2015 24
Presentation at IS Directors Conference | Interlaken - 18 September 2015
Legal notice
25
©2015 Swiss Re. All rights reserved. You are not permitted to create any modifications
or derivative works of this presentation or to use it for commercial or other public purposes
without the prior written permission of Swiss Re.
The information and opinions contained in the presentation are provided as at the date of
the presentation and are subject to change without notice. Although the information used
was taken from reliable sources, Swiss Re does not accept any responsibility for the accuracy
or comprehensiveness of the details given. All liability for the accuracy and completeness
thereof or for any damage or loss resulting from the use of the information contained in this
presentation is expressly excluded. Under no circumstances shall Swiss Re or its Group
companies be liable for any financial or consequential loss relating to this presentation.

More Related Content

What's hot

20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for ComeosBart Van Den Brande
 
telebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionstelebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionsFakher Oueslati
 
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
Ipswitch and cordery on the road  " All you need to know about GDPR but are t...Ipswitch and cordery on the road  " All you need to know about GDPR but are t...
Ipswitch and cordery on the road " All you need to know about GDPR but are t...Sébastien Roques
 
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...Kullarat Phongsathaporn
 
EU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart MeteringEU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart Meteringnuances
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskWilliam Gamble
 
Wearable technologies and remote patient remote monitoring system
Wearable technologies and remote patient remote monitoring systemWearable technologies and remote patient remote monitoring system
Wearable technologies and remote patient remote monitoring systemGiulio Coraggio
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceIT Governance Ltd
 
Governance, legal compliance and risk across the online economy
Governance, legal compliance and risk across the online economyGovernance, legal compliance and risk across the online economy
Governance, legal compliance and risk across the online economyERADAR
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...IT Governance Ltd
 
Intellectual property models in the electronic gaming industry
Intellectual property models in the electronic gaming industryIntellectual property models in the electronic gaming industry
Intellectual property models in the electronic gaming industryGiulio Coraggio
 
GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality Susan Moran
 
Come cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoCome cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoGiulio Coraggio
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRIT Governance Ltd
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
S32: APAC Technology Conference | Talking Notes
S32: APAC Technology Conference | Talking NotesS32: APAC Technology Conference | Talking Notes
S32: APAC Technology Conference | Talking NotesKullarat Phongsathaporn
 

What's hot (20)

20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos
 
telebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionstelebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutions
 
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
Ipswitch and cordery on the road  " All you need to know about GDPR but are t...Ipswitch and cordery on the road  " All you need to know about GDPR but are t...
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
 
20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here
 
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...
 
EU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart MeteringEU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart Metering
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
Wearable technologies and remote patient remote monitoring system
Wearable technologies and remote patient remote monitoring systemWearable technologies and remote patient remote monitoring system
Wearable technologies and remote patient remote monitoring system
 
Mbs r35 b
Mbs r35 bMbs r35 b
Mbs r35 b
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for compliance
 
Governance, legal compliance and risk across the online economy
Governance, legal compliance and risk across the online economyGovernance, legal compliance and risk across the online economy
Governance, legal compliance and risk across the online economy
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
 
Intellectual property models in the electronic gaming industry
Intellectual property models in the electronic gaming industryIntellectual property models in the electronic gaming industry
Intellectual property models in the electronic gaming industry
 
GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality
 
Preparing for EU GDPR
Preparing for EU GDPRPreparing for EU GDPR
Preparing for EU GDPR
 
Come cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoCome cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeo
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPR
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
S32: APAC Technology Conference | Talking Notes
S32: APAC Technology Conference | Talking NotesS32: APAC Technology Conference | Talking Notes
S32: APAC Technology Conference | Talking Notes
 
Gdpr and smart cities
Gdpr and smart citiesGdpr and smart cities
Gdpr and smart cities
 

Viewers also liked

ICLR: Lessons learned from the 2013 Calgary floods (March 26, 2015)
ICLR: Lessons learned from the 2013 Calgary floods (March 26, 2015)ICLR: Lessons learned from the 2013 Calgary floods (March 26, 2015)
ICLR: Lessons learned from the 2013 Calgary floods (March 26, 2015)glennmcgillivray
 
Swiss Re - EVM - slides 2006
Swiss Re - EVM - slides 2006Swiss Re - EVM - slides 2006
Swiss Re - EVM - slides 2006Felix Schlumpf
 
Martyn Parker - Country risk management and financial preparedness for disasers
Martyn Parker - Country risk management and financial preparedness for disasersMartyn Parker - Country risk management and financial preparedness for disasers
Martyn Parker - Country risk management and financial preparedness for disasersGlobal Risk Forum GRFDavos
 
Health and Climate Change in Developing Countries. Case Study: Cholera protec...
Health and Climate Change in Developing Countries. Case Study: Cholera protec...Health and Climate Change in Developing Countries. Case Study: Cholera protec...
Health and Climate Change in Developing Countries. Case Study: Cholera protec...Global Risk Forum GRFDavos
 

Viewers also liked (6)

Alhuda CIBE - Takaful an Emerging Market by Capt. M. Jamil Akhtar
Alhuda CIBE - Takaful an Emerging Market by Capt. M. Jamil AkhtarAlhuda CIBE - Takaful an Emerging Market by Capt. M. Jamil Akhtar
Alhuda CIBE - Takaful an Emerging Market by Capt. M. Jamil Akhtar
 
SwissRe Sigma 2 2015
SwissRe Sigma 2 2015SwissRe Sigma 2 2015
SwissRe Sigma 2 2015
 
ICLR: Lessons learned from the 2013 Calgary floods (March 26, 2015)
ICLR: Lessons learned from the 2013 Calgary floods (March 26, 2015)ICLR: Lessons learned from the 2013 Calgary floods (March 26, 2015)
ICLR: Lessons learned from the 2013 Calgary floods (March 26, 2015)
 
Swiss Re - EVM - slides 2006
Swiss Re - EVM - slides 2006Swiss Re - EVM - slides 2006
Swiss Re - EVM - slides 2006
 
Martyn Parker - Country risk management and financial preparedness for disasers
Martyn Parker - Country risk management and financial preparedness for disasersMartyn Parker - Country risk management and financial preparedness for disasers
Martyn Parker - Country risk management and financial preparedness for disasers
 
Health and Climate Change in Developing Countries. Case Study: Cholera protec...
Health and Climate Change in Developing Countries. Case Study: Cholera protec...Health and Climate Change in Developing Countries. Case Study: Cholera protec...
Health and Climate Change in Developing Countries. Case Study: Cholera protec...
 

Similar to ISDC_2015_Philippe Aerni_Cyber Versicherung

Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, ItalyWISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, ItalyCYBERWISER .eu
 
Aon - Cyber Insurance in the World of Cyber Criminals
Aon - Cyber Insurance in the World of Cyber CriminalsAon - Cyber Insurance in the World of Cyber Criminals
Aon - Cyber Insurance in the World of Cyber CriminalsCSNP
 
EU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentationEU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentationFERMA
 
WBC Summit Initio AML and blockchain
WBC Summit Initio AML and blockchainWBC Summit Initio AML and blockchain
WBC Summit Initio AML and blockchainInitio
 
Preventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Preventing Tax Evasion & Benefits Fraud Through Predictive AnalyticsPreventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Preventing Tax Evasion & Benefits Fraud Through Predictive AnalyticsCapgemini
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraKnowledge Group
 
Cyber risk challenge and the role of insurance
Cyber risk challenge and the role of insuranceCyber risk challenge and the role of insurance
Cyber risk challenge and the role of insuranceMunich Re
 
IoT = Insurance of Tomorrow ?
IoT = Insurance of Tomorrow ?IoT = Insurance of Tomorrow ?
IoT = Insurance of Tomorrow ?Initio
 
MMV Webinar 2. GDPR Insights. January 2018
MMV Webinar 2. GDPR Insights. January 2018MMV Webinar 2. GDPR Insights. January 2018
MMV Webinar 2. GDPR Insights. January 2018Match-Maker Ventures
 
Cyber liability FINAL
Cyber liability FINALCyber liability FINAL
Cyber liability FINALChris Evans
 
WBC Summit Initio GDPR and blockchain
WBC Summit Initio GDPR and blockchainWBC Summit Initio GDPR and blockchain
WBC Summit Initio GDPR and blockchainInitio
 
Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018Initio
 
DSS Company Presentation November 2015
DSS Company Presentation November 2015DSS Company Presentation November 2015
DSS Company Presentation November 2015Company Spotlight
 
05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on finance05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on financeinnov-acts-ltd
 
201201 b innopay presentation hft
201201 b innopay presentation hft201201 b innopay presentation hft
201201 b innopay presentation hftbakkertje99999
 

Similar to ISDC_2015_Philippe Aerni_Cyber Versicherung (20)

Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, ItalyWISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
 
Aon - Cyber Insurance in the World of Cyber Criminals
Aon - Cyber Insurance in the World of Cyber CriminalsAon - Cyber Insurance in the World of Cyber Criminals
Aon - Cyber Insurance in the World of Cyber Criminals
 
EU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentationEU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentation
 
WBC Summit Initio AML and blockchain
WBC Summit Initio AML and blockchainWBC Summit Initio AML and blockchain
WBC Summit Initio AML and blockchain
 
Preventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Preventing Tax Evasion & Benefits Fraud Through Predictive AnalyticsPreventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Preventing Tax Evasion & Benefits Fraud Through Predictive Analytics
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 
Cyber risk challenge and the role of insurance
Cyber risk challenge and the role of insuranceCyber risk challenge and the role of insurance
Cyber risk challenge and the role of insurance
 
Understanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in AsiaUnderstanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in Asia
 
IoT = Insurance of Tomorrow ?
IoT = Insurance of Tomorrow ?IoT = Insurance of Tomorrow ?
IoT = Insurance of Tomorrow ?
 
MMV Webinar 2. GDPR Insights. January 2018
MMV Webinar 2. GDPR Insights. January 2018MMV Webinar 2. GDPR Insights. January 2018
MMV Webinar 2. GDPR Insights. January 2018
 
Beawre pitch
Beawre pitchBeawre pitch
Beawre pitch
 
Cyber liability FINAL
Cyber liability FINALCyber liability FINAL
Cyber liability FINAL
 
WBC Summit Initio GDPR and blockchain
WBC Summit Initio GDPR and blockchainWBC Summit Initio GDPR and blockchain
WBC Summit Initio GDPR and blockchain
 
Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018
 
DSS Company Presentation November 2015
DSS Company Presentation November 2015DSS Company Presentation November 2015
DSS Company Presentation November 2015
 
05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on finance05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on finance
 
IPISC
IPISCIPISC
IPISC
 
201201 b innopay presentation hft
201201 b innopay presentation hft201201 b innopay presentation hft
201201 b innopay presentation hft
 
IPISC
IPISCIPISC
IPISC
 

More from IBM Switzerland

ISDC_2015_Niklaus Santschi_Digitalisierung des Zahlungsverkehrst
ISDC_2015_Niklaus Santschi_Digitalisierung des ZahlungsverkehrstISDC_2015_Niklaus Santschi_Digitalisierung des Zahlungsverkehrst
ISDC_2015_Niklaus Santschi_Digitalisierung des ZahlungsverkehrstIBM Switzerland
 
ISDC_2015_Frank Biernat_Joern Skerswetat_Apple&IBM Partnerschaft
ISDC_2015_Frank Biernat_Joern Skerswetat_Apple&IBM PartnerschaftISDC_2015_Frank Biernat_Joern Skerswetat_Apple&IBM Partnerschaft
ISDC_2015_Frank Biernat_Joern Skerswetat_Apple&IBM PartnerschaftIBM Switzerland
 
ISDC_2015_Monica Glisenti_Kundinnen und Kunden bestimmen
ISDC_2015_Monica Glisenti_Kundinnen und Kunden bestimmenISDC_2015_Monica Glisenti_Kundinnen und Kunden bestimmen
ISDC_2015_Monica Glisenti_Kundinnen und Kunden bestimmenIBM Switzerland
 
ISDC_2015_Behrang Khorsandian_The business value of social data
ISDC_2015_Behrang Khorsandian_The business value of social dataISDC_2015_Behrang Khorsandian_The business value of social data
ISDC_2015_Behrang Khorsandian_The business value of social dataIBM Switzerland
 
ISDC_2015_Glenn Brouwer_Digital Transformation
ISDC_2015_Glenn Brouwer_Digital TransformationISDC_2015_Glenn Brouwer_Digital Transformation
ISDC_2015_Glenn Brouwer_Digital TransformationIBM Switzerland
 
ISDC_2015_Jessica Douglas_Reinventing Customer Experience
ISDC_2015_Jessica Douglas_Reinventing Customer ExperienceISDC_2015_Jessica Douglas_Reinventing Customer Experience
ISDC_2015_Jessica Douglas_Reinventing Customer ExperienceIBM Switzerland
 
ISDC_2015_Samuel Gähwiller_The most innovative Social TV in Europe
ISDC_2015_Samuel Gähwiller_The most innovative Social TV in EuropeISDC_2015_Samuel Gähwiller_The most innovative Social TV in Europe
ISDC_2015_Samuel Gähwiller_The most innovative Social TV in EuropeIBM Switzerland
 
Presentation_ISDC 2014_Arndt Groth_PubliGroupe
Presentation_ISDC 2014_Arndt Groth_PubliGroupePresentation_ISDC 2014_Arndt Groth_PubliGroupe
Presentation_ISDC 2014_Arndt Groth_PubliGroupeIBM Switzerland
 
Presentation_ISDC 2014_Thomas Landolt_IBM
Presentation_ISDC 2014_Thomas Landolt_IBMPresentation_ISDC 2014_Thomas Landolt_IBM
Presentation_ISDC 2014_Thomas Landolt_IBMIBM Switzerland
 
Presentation_ISDC 2014_Peter Kasahara_IBM
Presentation_ISDC 2014_Peter Kasahara_IBMPresentation_ISDC 2014_Peter Kasahara_IBM
Presentation_ISDC 2014_Peter Kasahara_IBMIBM Switzerland
 
Presentation_ISDC 2014_Jonathan Wisler_SoftLayer
Presentation_ISDC 2014_Jonathan Wisler_SoftLayerPresentation_ISDC 2014_Jonathan Wisler_SoftLayer
Presentation_ISDC 2014_Jonathan Wisler_SoftLayerIBM Switzerland
 
Presentation_ISDC 2014_Félix Mauron_Abraxas
Presentation_ISDC 2014_Félix Mauron_AbraxasPresentation_ISDC 2014_Félix Mauron_Abraxas
Presentation_ISDC 2014_Félix Mauron_AbraxasIBM Switzerland
 
Presentation_ISDC 2014_Haig Alexander Peter_IBM
Presentation_ISDC 2014_Haig Alexander Peter_IBMPresentation_ISDC 2014_Haig Alexander Peter_IBM
Presentation_ISDC 2014_Haig Alexander Peter_IBMIBM Switzerland
 
Ibm bis 2014 jm tassetto moo cs momentum
Ibm bis 2014  jm tassetto moo cs momentumIbm bis 2014  jm tassetto moo cs momentum
Ibm bis 2014 jm tassetto moo cs momentumIBM Switzerland
 
Ibm bis 2014 o. goulay engagement des collaborateurs
Ibm bis 2014  o. goulay engagement des collaborateursIbm bis 2014  o. goulay engagement des collaborateurs
Ibm bis 2014 o. goulay engagement des collaborateursIBM Switzerland
 
Ibm bis 2014_spot_me_p_metrailler_transformativeeventswithacloudsauce
Ibm bis 2014_spot_me_p_metrailler_transformativeeventswithacloudsauceIbm bis 2014_spot_me_p_metrailler_transformativeeventswithacloudsauce
Ibm bis 2014_spot_me_p_metrailler_transformativeeventswithacloudsauceIBM Switzerland
 
Ibm bis 2014 o.bethmann le cloud juste un nuage
Ibm bis 2014 o.bethmann le cloud juste un nuageIbm bis 2014 o.bethmann le cloud juste un nuage
Ibm bis 2014 o.bethmann le cloud juste un nuageIBM Switzerland
 
Ibm bis 2014 m.ben mrad cmo study
Ibm bis 2014 m.ben mrad cmo studyIbm bis 2014 m.ben mrad cmo study
Ibm bis 2014 m.ben mrad cmo studyIBM Switzerland
 
Ibm bis 2014 m. rolfe cfo insights from ibm global c suite study
Ibm bis 2014 m. rolfe cfo insights from ibm global c suite studyIbm bis 2014 m. rolfe cfo insights from ibm global c suite study
Ibm bis 2014 m. rolfe cfo insights from ibm global c suite studyIBM Switzerland
 
Ibm bis 2014 g.l arpino stay relevant in a digital worldt
Ibm bis 2014 g.l arpino stay relevant in a digital worldtIbm bis 2014 g.l arpino stay relevant in a digital worldt
Ibm bis 2014 g.l arpino stay relevant in a digital worldtIBM Switzerland
 

More from IBM Switzerland (20)

ISDC_2015_Niklaus Santschi_Digitalisierung des Zahlungsverkehrst
ISDC_2015_Niklaus Santschi_Digitalisierung des ZahlungsverkehrstISDC_2015_Niklaus Santschi_Digitalisierung des Zahlungsverkehrst
ISDC_2015_Niklaus Santschi_Digitalisierung des Zahlungsverkehrst
 
ISDC_2015_Frank Biernat_Joern Skerswetat_Apple&IBM Partnerschaft
ISDC_2015_Frank Biernat_Joern Skerswetat_Apple&IBM PartnerschaftISDC_2015_Frank Biernat_Joern Skerswetat_Apple&IBM Partnerschaft
ISDC_2015_Frank Biernat_Joern Skerswetat_Apple&IBM Partnerschaft
 
ISDC_2015_Monica Glisenti_Kundinnen und Kunden bestimmen
ISDC_2015_Monica Glisenti_Kundinnen und Kunden bestimmenISDC_2015_Monica Glisenti_Kundinnen und Kunden bestimmen
ISDC_2015_Monica Glisenti_Kundinnen und Kunden bestimmen
 
ISDC_2015_Behrang Khorsandian_The business value of social data
ISDC_2015_Behrang Khorsandian_The business value of social dataISDC_2015_Behrang Khorsandian_The business value of social data
ISDC_2015_Behrang Khorsandian_The business value of social data
 
ISDC_2015_Glenn Brouwer_Digital Transformation
ISDC_2015_Glenn Brouwer_Digital TransformationISDC_2015_Glenn Brouwer_Digital Transformation
ISDC_2015_Glenn Brouwer_Digital Transformation
 
ISDC_2015_Jessica Douglas_Reinventing Customer Experience
ISDC_2015_Jessica Douglas_Reinventing Customer ExperienceISDC_2015_Jessica Douglas_Reinventing Customer Experience
ISDC_2015_Jessica Douglas_Reinventing Customer Experience
 
ISDC_2015_Samuel Gähwiller_The most innovative Social TV in Europe
ISDC_2015_Samuel Gähwiller_The most innovative Social TV in EuropeISDC_2015_Samuel Gähwiller_The most innovative Social TV in Europe
ISDC_2015_Samuel Gähwiller_The most innovative Social TV in Europe
 
Presentation_ISDC 2014_Arndt Groth_PubliGroupe
Presentation_ISDC 2014_Arndt Groth_PubliGroupePresentation_ISDC 2014_Arndt Groth_PubliGroupe
Presentation_ISDC 2014_Arndt Groth_PubliGroupe
 
Presentation_ISDC 2014_Thomas Landolt_IBM
Presentation_ISDC 2014_Thomas Landolt_IBMPresentation_ISDC 2014_Thomas Landolt_IBM
Presentation_ISDC 2014_Thomas Landolt_IBM
 
Presentation_ISDC 2014_Peter Kasahara_IBM
Presentation_ISDC 2014_Peter Kasahara_IBMPresentation_ISDC 2014_Peter Kasahara_IBM
Presentation_ISDC 2014_Peter Kasahara_IBM
 
Presentation_ISDC 2014_Jonathan Wisler_SoftLayer
Presentation_ISDC 2014_Jonathan Wisler_SoftLayerPresentation_ISDC 2014_Jonathan Wisler_SoftLayer
Presentation_ISDC 2014_Jonathan Wisler_SoftLayer
 
Presentation_ISDC 2014_Félix Mauron_Abraxas
Presentation_ISDC 2014_Félix Mauron_AbraxasPresentation_ISDC 2014_Félix Mauron_Abraxas
Presentation_ISDC 2014_Félix Mauron_Abraxas
 
Presentation_ISDC 2014_Haig Alexander Peter_IBM
Presentation_ISDC 2014_Haig Alexander Peter_IBMPresentation_ISDC 2014_Haig Alexander Peter_IBM
Presentation_ISDC 2014_Haig Alexander Peter_IBM
 
Ibm bis 2014 jm tassetto moo cs momentum
Ibm bis 2014  jm tassetto moo cs momentumIbm bis 2014  jm tassetto moo cs momentum
Ibm bis 2014 jm tassetto moo cs momentum
 
Ibm bis 2014 o. goulay engagement des collaborateurs
Ibm bis 2014  o. goulay engagement des collaborateursIbm bis 2014  o. goulay engagement des collaborateurs
Ibm bis 2014 o. goulay engagement des collaborateurs
 
Ibm bis 2014_spot_me_p_metrailler_transformativeeventswithacloudsauce
Ibm bis 2014_spot_me_p_metrailler_transformativeeventswithacloudsauceIbm bis 2014_spot_me_p_metrailler_transformativeeventswithacloudsauce
Ibm bis 2014_spot_me_p_metrailler_transformativeeventswithacloudsauce
 
Ibm bis 2014 o.bethmann le cloud juste un nuage
Ibm bis 2014 o.bethmann le cloud juste un nuageIbm bis 2014 o.bethmann le cloud juste un nuage
Ibm bis 2014 o.bethmann le cloud juste un nuage
 
Ibm bis 2014 m.ben mrad cmo study
Ibm bis 2014 m.ben mrad cmo studyIbm bis 2014 m.ben mrad cmo study
Ibm bis 2014 m.ben mrad cmo study
 
Ibm bis 2014 m. rolfe cfo insights from ibm global c suite study
Ibm bis 2014 m. rolfe cfo insights from ibm global c suite studyIbm bis 2014 m. rolfe cfo insights from ibm global c suite study
Ibm bis 2014 m. rolfe cfo insights from ibm global c suite study
 
Ibm bis 2014 g.l arpino stay relevant in a digital worldt
Ibm bis 2014 g.l arpino stay relevant in a digital worldtIbm bis 2014 g.l arpino stay relevant in a digital worldt
Ibm bis 2014 g.l arpino stay relevant in a digital worldt
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

ISDC_2015_Philippe Aerni_Cyber Versicherung

  • 1. Presentation at IS Directors Conference | Interlaken - 18 September 2015 1 Cyber Insurance a time journey, the past, the present and a glimpse at the future Presentation IS Directors Forum 2015 – Interlaken by Philippe Aerni & Willy Stössel
  • 2. Presentation at IS Directors Conference | Interlaken - 18 September 2015 2 Table of Contents Introduction Coverage and Services provided Loss Examples and Scenarios Underwriting Criteria for Risk Selection Outlook
  • 3. Presentation at IS Directors Conference | Interlaken - 18 September 2015 • Swiss Re Corporate Solutions has been underwriting Technology E&O (TMT – Technology, Media & Telecom) since 2001 • Cyber liability extensions and all 1st party extensions have been added over the years to all Technology E&O policies in the US market • Swiss Re Corporate Solutions has dedicated Underwriters for this line of business in – New York – London – Zurich – Paris • Swiss Re Corporate Solutions Risk Engineering and Group Risk Management & Information Security support Underwriters for the risk assessment Swiss Re Corporate Solutions Approach Underwriting Technology E&O and Cyber Insurance 3
  • 4. Presentation at IS Directors Conference | Interlaken - 18 September 2015 (Source: copyright protection may apply, source unknown) Cyber Risks Nightmare or Opportunity? 4
  • 5. Presentation at IS Directors Conference | Interlaken - 18 September 2015 5 Coverage and Services provided
  • 6. Presentation at IS Directors Conference | Interlaken - 18 September 2015     5 facts about the Cyber insurance market 6 USD 1.5-2b2014 worldwide estimated premium 2013: ~ USD 1.2b 2012: ~ USD 800m Competitive ratesas carriers try to defend or gain market share Full limitsavailable for coverages sub-limited before Healthcareis the fastest growing Cyber insurance buying segment North Americahas the highest demand for Cyber insurance globally Europe: low-mid demand will be driven by regulation
  • 7. Presentation at IS Directors Conference | Interlaken - 18 September 2015 The Cyber Risk Landscape 7
  • 8. Presentation at IS Directors Conference | Interlaken - 18 September 2015 Insurance Cover Landscape Traditional Policies vs specific Cyber Policies Tech, Media &Telecom (E&O) CyberGL PD/BI & Crime Libel Slander Defamation * excluded from standard product 8 PD / BI Requires "direct physical loss” -> not satisfied Crime: requires intent and only covers money, securities, and tangible property IP Infringement Copyright Trademark Patent * Errors & Omissions Tech Services Tech Products Unintentional Disclosure Unintentional Breach of Privacy Policy Breach of Confidentiality Investigation costs Notification costs Fines/Penalties Business Interruption Extortion moneys Privacy First PartyMitigation Advertisement Personal Injury Property/ Crime Existing Policy Landscape New Policy Landscape
  • 9. Presentation at IS Directors Conference | Interlaken - 18 September 2015 9 Cyber insurance First Party / ISBI*  Unauthorized access  Hacking  Virus  Denial of Service CommentProduct The current market offering includes First Party/ISBI, extortion and privacy coverage Extortion  Investigation costs  Extortion of monies due to credible threat e.g., introduction of malicious code Privacy  Unintentional disclosure  Breach of confidentiality  Business Interruption or loss of data due to a general malicious attack (e.g., generic virus: love bug virus)  Contingent Business Interruption due to lack of internet connectivity caused by IT failure at providers' location  Costs for reinstatement of data  Investigation costs to determine cause of security failure  Covers the monies paid by the insured as a result of a credible threat/series of related threats directed at the Insured  e.g., to corrupt, damage or destroy the Insured's computer system, or to restrict or hinder access to the Insured's computer system  e.g., to release, divulge, disseminate, destroy or use confidential information stored in the Insured's computer system  Liability: the defence and settlement costs for the liability of the insured arising out of its failure to adequately protect its private data  Remediation: the response costs following a data breach, including investigation, public relations, customer notification and credit monitoring  Fines and/or penalties: the costs to defend, settle fines and penalties that may be assessed by the regulator Current market offering *Stand-alone property/extensions to property
  • 10. Presentation at IS Directors Conference | Interlaken - 18 September 2015 10 1 Bodily injury/ Property damage  Current cover extends to economic loss only following a cyber event  Clear differentiation to existing PD/BI products (Property/Casualty)  New: AIG offers this coverage as a DIC/DIL coverage sitting excess of scheduled policies 2 Patent Infringement plus theft of trade secrets  Undesired and hard to insure/quantify coverage 3 Fines & Penalties  Other than Data Protection fines following a breach 4 War, invasion, act of foreign enemy, hostilities or war-like operations (whether declared or not), civil war, mutiny, civil commotion  Coverage is provided for act of cyber terrorism 5 Any seizure, confiscation, nationalization or destruction of a Computer System or electronic data by order of any governmental or public authority 6 Force Majeure  Earthquake, volcanic eruption, tidal waves etc Overview of major market exclusions
  • 11. Presentation at IS Directors Conference | Interlaken - 18 September 2015 • Traditional insurance policies provide limited coverage only for cyber attacks: Gaps in existing traditional policies 11
  • 12. Presentation at IS Directors Conference | Interlaken - 18 September 2015 12 Breach notification / consultation Forensics Breach consultation Notification design Public relations  First point of contact will be Swiss Re and our external "Data Breach Counsel." This will be coordinated through NetDiligence platform  Five hour initial consultation from Data Breach counsel  Facts gathered will allow Swiss Re assess if true breach has occurred  Without first point of contact materials may be discoverable  Retention of Forensic services:  To contain the breach  To understand the scope and breadth of breach  Review of forensic materials  When and where are breach notifications required?  What is the potential for regulatory fines or penalties?  What is the potential for legal action?  What are the next steps?  Craft letter to Attorneys General and other state and federal agencies  Craft letters to be sent to affected parties  Craft speech and flow chart for call centers and potential credit monitoring companies  Engage public relations and crisis management experts to work with Swiss Re Claims and Data Breach Counsel during course of breach Post-breach services to be delivered by a Primary Insurance Carrier Cyber breach response – process overview and key considerations
  • 13. Presentation at IS Directors Conference | Interlaken - 18 September 2015 Potential Risk Event Likelihood Potential impact Website/copyright /trademark infringement claims Low Low Legal Liability to other for computer security breaches Low – Medium Medium Legal Liability to others for privacy breaches Low – Medium Medium Privacy breach notification costs & credit monitoring Low – Medium Medium Privacy regulatory action defense and fines Low Medium Costs to repair damage to your information assets Low Medium Loss of revenue due to a failure of security at a dependent technology provider Low Medium Cyber Extortion threat Low Medium Loss of revenue resulting from non-physical business interruption Low – Medium High Risk identification – Europe 13
  • 14. Presentation at IS Directors Conference | Interlaken - 18 September 2015 14 Loss Examples Examples of large losses US and not only in the US Security Breaches / Data Breaches – type of losses
  • 15. Presentation at IS Directors Conference | Interlaken - 18 September 2015 15 Centcom Twitter Youtube Breach Anthem BC/BS  Nr 2 Healthcare insurer in the US  50 million PII records breached  Excess of 80 m records stolen  Notification costs will hit the existing cyber tower: USD 100m - for at least USD 120m [Jan 2015] Recent examples of data-loss incidents  Twitter & YouTube accounts hacked and pro-ISIS content uploaded [Jan 2015] Morgan Stanley Insider attack compromising 3.5m customer accounts [Dec 2014] Sony PSN/Microsoft Xbox Live Network DOS attack by hacker group (Lizard squad) shut down service around Xmas holidays [Dec 2014]  Sony has booked USD 171m in data breach direct costs to date*  Target has incurred USD 178m in breach related expenses as of Nov 2014**  Heartland payment systems paid USD 150m in fines and legal costs from breach and suffered damage to its reputation as a payment processor *** * PropertyCasualty360 ** New York Times *** The Wall Street Journal
  • 16. Presentation at IS Directors Conference | Interlaken - 18 September 2015 Korea's financial regulators are coming down hard on three credit card companies whose customer data was stolen in the largest personal information leak in the country's history. The Financial Services Commission and the Financial Supervisory Service will suspend the business operations of KB Kookmin Card, NH Nonghyup Card and Lotte Card for three months starting February 17th 2014. Under the terms of the suspension, the companies will be banned from taking on new customers, issuing card loans or processing cash advances. Existing customers, however, will not be affected as the suspension does not ban the firms from providing financial services to them. .. Last month's leak, which affected at least 20 million people, sparked concerns the data could have ended up in the hands of scammers. The estimated compensation for mental damage caused to customers is expected to reach nearly $160 Mio. As another part of the punishment, the CEOs of the three firms are to face punishment depending on their accountability. source: …...Connie Kim, Arirang News. DigiNotar (September 2011), was a Dutch certificate authority, after it had become clear that a security breach had resulted in the fraudulent issuing of certificates, the Dutch government took over operational management of DigiNotar's systems. The company was declared bankrupt. Cyberattacks on critical infrastructure are a reality and they're becoming more frequent. An IT security report for 2014 published by Germany's Federal Office for Information Security (BSI) … incident that caused physical damage to a facility. …An attack launched by an advanced persistent threat (APT) group against an unnamed steel plant in Germany resulted in significant damage, according a new report. Areva – Theft of IP, alleged state sponsored attack Orange France: hacked twice in 2014, release of 1 mil plus customer data. Security Breaches / Data Breach Not only US losses (source: various articles) 16
  • 17. Presentation at IS Directors Conference | Interlaken - 18 September 2015 17 Underwriting Criteria for Risk Selection
  • 18. Presentation at IS Directors Conference | Interlaken - 18 September 2015 18 Are you ready to respond to breaches?      Are breach response procedures set up? Are roles and responsibilities assigned? Are monitoring and detection measures in place? Are immediate measures instituted to protect data? Are investigation resources available to analyse breaches? Are response and notification measures established? Are communication processes established?
  • 19. Presentation at IS Directors Conference | Interlaken - 18 September 2015 Swiss Re Corso: IBM and Swiss Re teaming up to offer cyber risk protection services for commercial customers 19 Swiss Re’s Business Challenge • Entering new market – wanted to partner with experienced cyber security experts • Focus enterprises, across the globe for four types of exposures: computer viruses, hacking, Distributed Denial of Service or malware Joint Approach • Comprehensive support provided by a trusted partner: from training and cyber education through security risk assessments and vulnerability scans to cyber claims assistance Swiss Re`s Benefits • Immediate access to world class expertise and experience of the global security leader – attractive value proposition to prospective customers • Integration of cyber assessments and claims handling into overall Swiss Re`s business processes – leverage of best practices Swiss Re IBM Applicant
  • 20. Presentation at IS Directors Conference | Interlaken - 18 September 2015 IBM Cyber Security - Global reach and capabilities with local presence 20
  • 21. Presentation at IS Directors Conference | Interlaken - 18 September 2015 21 Outlook
  • 22. Presentation at IS Directors Conference | Interlaken - 18 September 2015 Driving Factors for Cyber Insurance A Constantly Changing World 22 New Technology Legal Environment Accumulation issues Supply Chain M&A Growth Plans Complexity Cloud Computing "underestimated" small exposure Connectivity Known VulnerabilitiesAwareness & Litigation approach Business Strategy Hacker Focus Company X Standardization
  • 23. Presentation at IS Directors Conference | Interlaken - 18 September 2015 • North America – Canada – Mexico – United States (different legislation applies for certain industries and notification required in > 46 states) • Central & South America – Argentina – Brazil (Pending) – Chile – Colombia – Costa Rica – Ecuador (Pending) – Paraguay – Peru – Uruguay • Middle East – Israel – UAE (DIFC) Countries with Privacy/Data Protection Laws  Africa – South Africa – Tunisia  Asia-Pacific – Australia – China (draft privacy guidelines) – Hong Kong – India (privacy rules explained) – Japan – Malaysia – New Zealand – Philippines – Singapore – South Korea – Taiwan – Thailand – Vietnam  Europe – 27 EU Member States + – Norway – Russia – Serbia – Switzerland – Turkey (Pending) – Ukraine EU Data Protection reform – (Regulation): revised version going to parliament after 21.10.2013 committee review, fines of up to EUR 100 Mio or 5% of annual worldwide turnover, whichever is greater Update: Discussions also impacted by TTIP, heavily delayed There are 105 countries with existing or pending privacy or data protection legislation
  • 24. Presentation at IS Directors Conference | Interlaken - 18 September 2015 24
  • 25. Presentation at IS Directors Conference | Interlaken - 18 September 2015 Legal notice 25 ©2015 Swiss Re. All rights reserved. You are not permitted to create any modifications or derivative works of this presentation or to use it for commercial or other public purposes without the prior written permission of Swiss Re. The information and opinions contained in the presentation are provided as at the date of the presentation and are subject to change without notice. Although the information used was taken from reliable sources, Swiss Re does not accept any responsibility for the accuracy or comprehensiveness of the details given. All liability for the accuracy and completeness thereof or for any damage or loss resulting from the use of the information contained in this presentation is expressly excluded. Under no circumstances shall Swiss Re or its Group companies be liable for any financial or consequential loss relating to this presentation.