cyber iriskinfo
TRANSCRIPT
PROTECTING THE BALANCE SHEET
CRIMINALS CASING COMPUTERS
FIRST LINE OF DEFENSE:
DEVELOP, IMPLEMENT AND
MONITOR SECURE SYSTEMS
AND EFFECTIVE HUMAN
STRATEGIES
SECURE NETWORK
ENCRYPTION
GUARDING INFORMATION
PROTOCOLS
TRAINING
TESTING & AUDITS
POST-BREACH PLAN
VIGILANCE
THE UNFORTUNATE REALITY
BAD GUYS GETTING
BETTER
SYSTEMS FAIL
PROTOCOLS NOT
ALWAYS FOLLOWED
PEOPLE MAKE
MISTAKES
WHEN BAD STUFF HAPPENS:
TWO CHOICES…
ACCEPT RISK:
PAY LOSSES DIRECTLY
FROM YOUR PROFITS
AND BOTTOM LINE
TRANSFER RISK:
FINANCIAL TRANSFER
THROUGH AN
INSURANCE PRODUCT
.
MATURE INDUSTRY:
COURT TESTED WORDING
PRICED BY ACTUARIES
CYBER NOT CONTEMPLATED
& USUALLY EXCLUDED
.
NEW TECHNOLGY:
NEW RISKS
INDUSTRY RESPONDS WITH
NEW PRODUCTS
COVERAGE GRANTS
POLICY WORDING
EXCLUSIONS
FIRST PARTY:
COVERS THE POLICYHOLDER
FOR COSTS THEY SUSTAIN
AFTER A BREACH OF THEIR
SYSTEMS, OR A REPORTABLE
PRIVACY INCIDENT
REGULATORY PROCEEDINGS
PRIVACY NOTIFICATION AND
CREDIT MONITORING COSTS
SYSTEM DAMAGE & DATA
CORRUPTION
BUSINESS INTERRUPTION &
EXTRA EXPENSE
EXTORTION
POST BREACH COACHING
BRAND PROTECTION
FORENSICS EXPENSE
THIRD PARTY:
COVERS THE POLICYHOLDER
FOR LIABILITY TO OTHER
ENTITIES WHEN A BREACH
OCCURS – DEFENSE AND
COVERED DAMAGES
INFORMATION SECURITY &
PRIVACY LIABILITY –
COVERED DAMAGES AND
DEFENSE
VIRUS/HACKING LIABILITY
INTERNET MEDIA LIABILITY
PCI FINES AND COSTS
INTELLECTUAL PROPERTY
CRIME COVERAGE:
COMPUTER FRAUD
SOCIAL ENGINEERING
COVERAGE GRANTS
POLICY WORDING
EXCLUSIONS
COVERAGE TRIGGER
DEFINE BREACH & CLAIM
SYSTEM DAMAGE
MINIMUM STANDARDS
ENCRYPTIONS
PAPER RECORDS
DEFENSE COUNSEL
ATTORNEY CLIENT PRIVILEGE
PRESERVATION OF EVIDENCE
COVERAGE GRANTS
POLICY WORDING
EXCLUSIONS
FRAUD/DISHONESTY
FAILURE TO DISCLOSE
CELL PHONES/LAPTOPS
WIRELESS NETWORK
CALL BACK VERIFICATION
E&O OF THIRD PARTY
TERRORISM
GREAT DECISIONS
ARE PROACTIVE
AND INFORMED,
NOT INACTIVE
AND BY DEFAULT