20
Valuing Cyber Risks and First Party Damages Russ Zinn Bob Kirchmeier CT Valley Chapter April 4, 2017

Valuing Cyber Risks and First Party Damages

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Valuing Cyber Risks and First Party Damages

Valuing Cyber Risks and First Party Damages

Russ Zinn Bob Kirchmeier

CT Valley Chapter April 4, 2017

Page 2: Valuing Cyber Risks and First Party Damages

Business Interruption!

Data Breach!

Regulatory!

Data Assets!

Reputation!

Extortion/Ransom!

Network!

Cyber BCP

Cyber Insurance

Cyber Legislation

?Financial Exposure

  Cyber News  Cyber Planning  Cyber Coverage

Page 3: Valuing Cyber Risks and First Party Damages

The Issue:

Cyber is a “PERIL” that manifests itself across MULTIPLE coverage lines

Page 4: Valuing Cyber Risks and First Party Damages

What’s the Problem? •  Theft or loss of Data

– Motive: Financial gain•  Data destruction

– Motive: ideological, extortion, terrorism, war•  Communication Disruption

– Motive: ideological, extortion, terrorism, war•  Operational or physical disruption

– Control system takeover halting operations, destroying machinery and facilities

Page 5: Valuing Cyber Risks and First Party Damages

Root Causes •  Intentional – Malicious / criminal

–  Nation States•  Economic espionage•  Destructive – influence policies

–  Criminal – Low risk w/ potential high payoff•  Theft•  Extortion

–  Personal Hacktivists•  Call attention to a perceived grievance•  Enjoyment

–  Insider – Bad actor•  Most capable of damage•  Circumvents protections against unauthorized access

•  Unintentional–  Human error – Insider/vendor–  System or software glitch

Page 6: Valuing Cyber Risks and First Party Damages

Root Causes (cont.)

Most breaches result from inadequate internal procedures and training … IT security against external threats is not enough.

Source: IBM/Ponemon “2015 Cost of Cyber Breach Study”

Page 7: Valuing Cyber Risks and First Party Damages

High Profile Targets •  Retail

•  Healthcare

•  Financial Institutions – early adopters (late 90’s) due to network risks

•  Production: energy, water, communications, manufacturing

•  The rest of us, organizations and individuals, rely on technology more and more

Page 8: Valuing Cyber Risks and First Party Damages

Examples •  Target: C-suite executives fired•  Stuxnet : Extensive physical damage by

overtaking industrial controls•  Steel Mill: destructive attack via spear

phishing on blast furnace •  BTC Pipeline: Wireless network to shut

down alarms, over pressurized pipeline•  Aramco: Insider deployed malware 30,000

computers inoperable 10 day recovery

Page 9: Valuing Cyber Risks and First Party Damages

Yahoo 2016 Update CEO loses bonus Chief legal resigns

Verizon acquisition renegotiated ($350 Million reduction)

43 consumer class action suitsStockholder class-action suit

(NY Times 3/2/2017)

Page 10: Valuing Cyber Risks and First Party Damages

Costs Increasing frequency, response costs, impact on business

Who is financially responsible, and what is the resulting harm

Page 11: Valuing Cyber Risks and First Party Damages

Typical Damages •  Regulatory fines & penalties

–  Comprehensive Written Information Security Program

•  Industry fines: PCI, Card Brand

•  Privacy liability

•  Network security liability

•  Media / content liability – IP & personal injury (often excludes patent & trade secrets); reissue credit cards

•  Technology Services/Products & Professional E&O

•  Other liability: accidental transmission of malware

Outsourcing the function does not outsource liability

Page 12: Valuing Cyber Risks and First Party Damages

First Party Damages •  Breach response (often covered)

–  Crisis Management–  Legal costs–  Notification costs–  Credit/ID monitoring–  Investigation / Forensics–  Public relations

•  Intellectual Property (though sometimes excludes trade secrets)–  Customer information–  Pricing information

•  Data Restoration

•  Cyber extortion – avoid an attack

Page 13: Valuing Cyber Risks and First Party Damages

First Party Damages (cont.) •  Loss of income, i.e. business interruption

–  Network Interruption / System Failure•  Lost income from an interruption to an Insured Computer

System, resulting from:–  Security failure, attack, malware–  System failure: broadened to include human error & system failure

•  Contingent / dependent BI•  Corporate/shared platforms, like hospitality

•  Reputational–  Losses beyond operational disruption –  Coverage limits, time limits, expectations for response.–  Industries this particularly affects are health, retail and

financial services

Page 14: Valuing Cyber Risks and First Party Damages

What to do •  Board level ownership

– Enterprise-wide risk, not just an IT threat – reputational / market

– Understand regulatory implications– Boards should have access to cyber security

expertise and should get regular updates– Establish cyber risk management / security

framework / culture

•  Normal RM approach: identify, evaluate, control, finance, monitor

Page 15: Valuing Cyber Risks and First Party Damages

What to do (cont.) •  Balance Investments

– Protection/Prevention•  Employee awareness/training is biggest ROI•  IT Security – Identify what’s important to you/them?

– Response / Detection•  Shorten the interval for detection & containment•  Adoption of outsourced / cloud enabled security – more

signal & less noise•  Dedicated or assigned response?

Page 16: Valuing Cyber Risks and First Party Damages

Insurance Considerations •  Traditional lines are moving to exclude anything cyber related•  Plenty of capacity is available for SMB’s / non-high profile risks•  Insurance coverage becoming more uniform•  Pay attention to:

–  Align with other coverages (CGL, property, E&O, D&O)–  Application details!–  Prior acts: If first year, can you get it backdated–  Extra coverage grants–  Vendor selection–  Sublimits–  Deductibles / waiting periods–  Exclusions

•  Coverage condition requiring “reasonable” protective measures•  Breach of contract exclusions

•  BI / Reputational coverage vague but becoming more relevant•  Early claims are setting precedent and highly scrutinized

Page 17: Valuing Cyber Risks and First Party Damages

Other Remedies

•  Contractual indemnification / hold harmless

•  Additional insured status on others’ coverage– Underlying coverage requirements

Page 18: Valuing Cyber Risks and First Party Damages

Conclusion •  ERM framework applies

•  Business Continuity Planning is critical–  Mostly peril agnostic with cyber specific

enhancements

•  Benefits–  Reduce impact, including uninsured losses–  Gain a competitive advantage–  Address scrutiny of creditors & investors–  Address scrutiny of customers & suppliers–  Better access to coverage / lower premiums

Page 19: Valuing Cyber Risks and First Party Damages

Business Interruption!

Data Breach!

Regulatory!

Data Assets!

Reputation!

Extortion/Ransom!

Network!

Cyber BCP

Cyber Insurance

Cyber Legislation

?Financial Exposure

  Cyber News  Cyber Planning  Cyber Coverage

Page 20: Valuing Cyber Risks and First Party Damages

Conclusion

Thank you!Russell Zinn

(203) [email protected]

Bob Kirchmeier (862) 251-2767

[email protected]