cyber iriskinfo

27
PROTECTING THE BALANCE SHEET CRIMINALS CASING COMPUTERS

Upload: iriskinfo

Post on 20-Mar-2017

11 views

Category:

Business


0 download

TRANSCRIPT

Page 1: Cyber iriskinfo

PROTECTING THE BALANCE SHEET

CRIMINALS CASING COMPUTERS

Page 2: Cyber iriskinfo

FIRST LINE OF DEFENSE:

DEVELOP, IMPLEMENT AND

MONITOR SECURE SYSTEMS

AND EFFECTIVE HUMAN

STRATEGIES

Page 3: Cyber iriskinfo

SECURE NETWORK

ENCRYPTION

GUARDING INFORMATION

PROTOCOLS

TRAINING

TESTING & AUDITS

POST-BREACH PLAN

VIGILANCE

Page 4: Cyber iriskinfo

THE UNFORTUNATE REALITY

Page 5: Cyber iriskinfo

BAD GUYS GETTING

BETTER

SYSTEMS FAIL

PROTOCOLS NOT

ALWAYS FOLLOWED

PEOPLE MAKE

MISTAKES

Page 6: Cyber iriskinfo

WHEN BAD STUFF HAPPENS:

TWO CHOICES…

Page 7: Cyber iriskinfo

ACCEPT RISK:

PAY LOSSES DIRECTLY

FROM YOUR PROFITS

AND BOTTOM LINE

Page 8: Cyber iriskinfo

TRANSFER RISK:

FINANCIAL TRANSFER

THROUGH AN

INSURANCE PRODUCT

Page 9: Cyber iriskinfo

.

MATURE INDUSTRY:

COURT TESTED WORDING

PRICED BY ACTUARIES

CYBER NOT CONTEMPLATED

& USUALLY EXCLUDED

Page 10: Cyber iriskinfo

.

NEW TECHNOLGY:

NEW RISKS

INDUSTRY RESPONDS WITH

NEW PRODUCTS

Page 12: Cyber iriskinfo

FIRST PARTY:

COVERS THE POLICYHOLDER

FOR COSTS THEY SUSTAIN

AFTER A BREACH OF THEIR

SYSTEMS, OR A REPORTABLE

PRIVACY INCIDENT

Page 13: Cyber iriskinfo

REGULATORY PROCEEDINGS

PRIVACY NOTIFICATION AND

CREDIT MONITORING COSTS

SYSTEM DAMAGE & DATA

CORRUPTION

BUSINESS INTERRUPTION &

EXTRA EXPENSE

Page 14: Cyber iriskinfo

EXTORTION

POST BREACH COACHING

BRAND PROTECTION

FORENSICS EXPENSE

Page 15: Cyber iriskinfo

THIRD PARTY:

COVERS THE POLICYHOLDER

FOR LIABILITY TO OTHER

ENTITIES WHEN A BREACH

OCCURS – DEFENSE AND

COVERED DAMAGES

Page 16: Cyber iriskinfo

INFORMATION SECURITY &

PRIVACY LIABILITY –

COVERED DAMAGES AND

DEFENSE

VIRUS/HACKING LIABILITY

INTERNET MEDIA LIABILITY

PCI FINES AND COSTS

INTELLECTUAL PROPERTY

Page 17: Cyber iriskinfo

CRIME COVERAGE:

COMPUTER FRAUD

SOCIAL ENGINEERING

Page 19: Cyber iriskinfo

COVERAGE TRIGGER

DEFINE BREACH & CLAIM

SYSTEM DAMAGE

MINIMUM STANDARDS

ENCRYPTIONS

PAPER RECORDS

DEFENSE COUNSEL

ATTORNEY CLIENT PRIVILEGE

PRESERVATION OF EVIDENCE

Page 21: Cyber iriskinfo

FRAUD/DISHONESTY

FAILURE TO DISCLOSE

CELL PHONES/LAPTOPS

WIRELESS NETWORK

CALL BACK VERIFICATION

E&O OF THIRD PARTY

TERRORISM

Page 22: Cyber iriskinfo
Page 23: Cyber iriskinfo
Page 24: Cyber iriskinfo
Page 25: Cyber iriskinfo
Page 26: Cyber iriskinfo

GREAT DECISIONS

ARE PROACTIVE

AND INFORMED,

NOT INACTIVE

AND BY DEFAULT