cyber iriskinfo

Post on 20-Mar-2017

11 Views

Category:

Business

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

PROTECTING THE BALANCE SHEET

CRIMINALS CASING COMPUTERS

FIRST LINE OF DEFENSE:

DEVELOP, IMPLEMENT AND

MONITOR SECURE SYSTEMS

AND EFFECTIVE HUMAN

STRATEGIES

SECURE NETWORK

ENCRYPTION

GUARDING INFORMATION

PROTOCOLS

TRAINING

TESTING & AUDITS

POST-BREACH PLAN

VIGILANCE

THE UNFORTUNATE REALITY

BAD GUYS GETTING

BETTER

SYSTEMS FAIL

PROTOCOLS NOT

ALWAYS FOLLOWED

PEOPLE MAKE

MISTAKES

WHEN BAD STUFF HAPPENS:

TWO CHOICES…

ACCEPT RISK:

PAY LOSSES DIRECTLY

FROM YOUR PROFITS

AND BOTTOM LINE

TRANSFER RISK:

FINANCIAL TRANSFER

THROUGH AN

INSURANCE PRODUCT

.

MATURE INDUSTRY:

COURT TESTED WORDING

PRICED BY ACTUARIES

CYBER NOT CONTEMPLATED

& USUALLY EXCLUDED

.

NEW TECHNOLGY:

NEW RISKS

INDUSTRY RESPONDS WITH

NEW PRODUCTS

FIRST PARTY:

COVERS THE POLICYHOLDER

FOR COSTS THEY SUSTAIN

AFTER A BREACH OF THEIR

SYSTEMS, OR A REPORTABLE

PRIVACY INCIDENT

REGULATORY PROCEEDINGS

PRIVACY NOTIFICATION AND

CREDIT MONITORING COSTS

SYSTEM DAMAGE & DATA

CORRUPTION

BUSINESS INTERRUPTION &

EXTRA EXPENSE

EXTORTION

POST BREACH COACHING

BRAND PROTECTION

FORENSICS EXPENSE

THIRD PARTY:

COVERS THE POLICYHOLDER

FOR LIABILITY TO OTHER

ENTITIES WHEN A BREACH

OCCURS – DEFENSE AND

COVERED DAMAGES

INFORMATION SECURITY &

PRIVACY LIABILITY –

COVERED DAMAGES AND

DEFENSE

VIRUS/HACKING LIABILITY

INTERNET MEDIA LIABILITY

PCI FINES AND COSTS

INTELLECTUAL PROPERTY

CRIME COVERAGE:

COMPUTER FRAUD

SOCIAL ENGINEERING

COVERAGE TRIGGER

DEFINE BREACH & CLAIM

SYSTEM DAMAGE

MINIMUM STANDARDS

ENCRYPTIONS

PAPER RECORDS

DEFENSE COUNSEL

ATTORNEY CLIENT PRIVILEGE

PRESERVATION OF EVIDENCE

FRAUD/DISHONESTY

FAILURE TO DISCLOSE

CELL PHONES/LAPTOPS

WIRELESS NETWORK

CALL BACK VERIFICATION

E&O OF THIRD PARTY

TERRORISM

GREAT DECISIONS

ARE PROACTIVE

AND INFORMED,

NOT INACTIVE

AND BY DEFAULT

top related