36
Philadelphia, PA ~ April 11 & 12, 2007 2007 E&O 2007 E&O Symposium Symposium New Threats, New Liabilities State of the Privacy Insurance Market April, 2007 Professional Liability Underwriting Society 2007 E&O Symposium Philadelphia, PA

New Threats, New Liabilities State of the Privacy Insurance Market April, 2007

Embed Size (px)

DESCRIPTION

New Threats, New Liabilities State of the Privacy Insurance Market April, 2007. Professional Liability Underwriting Society 2007 E&O Symposium Philadelphia, PA. New Threats, New Liabilities State of the Privacy Insurance Market April, 2007. Panel - PowerPoint PPT Presentation

Citation preview

Page 1: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Philadelphia, PA ~ April 11 & 12, 2007

2007 E&O 2007 E&O SymposiumSymposium

New Threats, New LiabilitiesState of the Privacy Insurance Market April, 2007

Professional Liability Underwriting Society2007 E&O Symposium

Philadelphia, PA

Page 2: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

New Threats, New LiabilitiesState of the Privacy Insurance Market April, 2007

Panel

Sandy Codding Managing Director, Marsh Inc.

Mark Greisiger President, NetDiligence

Brian Schaeffer, CISSP Senior VP, CIO, CTO, Liberty Bell Bank

Lori Bailey Asst. VP, National Union Insurance Co.

Page 3: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

What Are the Risks?What Are the Risks?

Privacy, Computer and Network Security are not just Internet issues.

Any entity using the following is at risk:

1) a computer network; and/or

2) confidential information.

Page 4: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Traditional Approaches to Traditional Approaches to Technology-Related RiskTechnology-Related Risk

• Corporations have viewed information security as a pure technology problem Budget for services/products Hire CISO, additional IT staff Outsource critical network security components

• Confusing array of products and vendors• Reactive—buy a solution in the wake of an event• Has not been treated like other risk management

issues

Page 5: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Who’s buying?Who’s buying?

•Technology & Telecommunications

• Financial Institutions

• Health Insurers and HMO’s

• Media & Communications

• Retailers

• Colleges & Universities

Page 6: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Why are they buying?Why are they buying?

Contractual Requirements

Regulatory Concerns

Gaps in Traditional Coverage

Pre-Claim Expenses

Actual Claims and Losses

Page 7: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Why are they buying now?Why are they buying now?

Contractual Requirements

• Trading partners are adding new indemnification requirements to contracts specifying privacy and cyber

Regulatory Concerns

• New regulations impose prospective duties upon companies

Gaps in Traditional Coverage

• P&C policies are expressly excluding coverage for cyber & privacy perils• No coverage for pre-claim expenses or regulatory defense

Risks no longer limited to Technology companies

• FI, Retail, et al now finding themselves squarely in the cross hairs of the regulators, organized crime and plaintiffs’ bar

• Victims—individuals and corporations—no longer content to suffer in silence are looking to hold companies responsible for costs associated with breaches

Page 8: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Why aren’t they buying more?Why aren’t they buying more?

Inconsistent Pricing/Underwriting• Pricing varies widely from carrier to carrier for same risk• Terms often seem subject to the whims of the underwriter

Confusing & Restrictive policy language• Multiple coverage grants or modules• More exclusions than thought humanly possible• Limitation to the single “computer attack” peril

Lack of Significant limits for various industries/coverage• FI, Retail, Higher Ed etc are either preferred or restricted classes

depending upon the carrier• Lack of communal approach to excess layers• de minimus sub-limits on Notification and Regulatory Defense

Lack of claims examples• Remember EPLI?

Page 9: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Philadelphia, PA ~ April 11 & 12, 2007

2007 E&O 2007 E&O SymposiumSymposium

FrontlineFrontline PerspectivePerspective

Cyber Risk & Loss Cyber Risk & Loss PreventionPrevention

Mark GreisigerNetDiligence

Page 10: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Customer AttitudesCustomer Attitudes

virus damage hackerscyber

extortionInternet liability

human mistakes

Web vandalsdenial of service

Web site disability access discrimination

computer /server

malfunctions

rogue administrators

ASP service outage

malicious code transmission

Intellectual property

infringementprivacy breach ISP outage

Unix & Windows O.S. Flaws

Risk Mgrs gaining a better appreciation for the diverse threats that Risk Mgrs gaining a better appreciation for the diverse threats that CAN impact their ecom operations, and bottom lineCAN impact their ecom operations, and bottom line

Page 11: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Driving Customer Attitudes Driving Customer Attitudes

Risk Mgrs ( D&Os) see their peers impactedRisk Mgrs ( D&Os) see their peers impacted weeklyweekly

Samples of security breaches within the retail industry

Jan 2007 – TJX: Disclosed that “unauthorized intruder” gained access to its systems in mid-December and may have made off with the card data of customers in the U.S., Canada and Puerto Rico, as well as the U.K. and Ireland.

Nov 2006 - Starbucks Corp. said it had lost track of four laptop computers, two of which had private information on about 60,000 current and former U.S. employees and fewer than 80 Canadian workers and contractors.

February 2006 – OfficeMax: The California retailer at the heart of a major data-security breach affecting as many as 200,000 consumers, banking and law-enforcement sources confirmed. They also said investigators are exploring the possibility that the Russian mob or another Eastern European crime syndicate is responsible for accessing U.S. consumers' debit-card numbers and selling counterfeit cards on the black market worldwide.

April 2005 - Ralph Lauren: Polo Ralph Lauren Corp. blamed a software glitch for a security breach that prompted HSBC North America to notify 108,000 holders of its General Motors-branded MasterCard that their personal information may have been stolen.

April 2005 - DSW Shoe Warehouse: Retail Ventures Inc. this month reported that personal customer information from 108 stores in its DSW Shoe Warehouse subsidiary was stolen. The information, involving 1.4 million credit cards used to make purchases mostly between November and February, included account numbers, names, and transaction amounts.

Page 12: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Network ThreatsNetwork Threats

• Malicious Viruses/trojans, stealth hackers, extortionist, rogue inside or

overseas contractor, disgruntled CIO, greedy fraudsters (phishing), belligerent ‘pranksters’

• Non-Malicious1. Employee/ Partner mistakes (customer data leaks)2. Application glitches

• Business Trends Points of failure are now magnified/multiplied due to trends of

outsourcing computing needs (domestic and overseas)

Massive dependencies and data-sharing between companies and their upstream and downstream vendors (ASPs, partners, ISPs)

Page 13: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Example - How Real Are The Example - How Real Are The Threat Exposures?Threat Exposures?

• Denial of service attacks are more common & difficult to prevent

• Imagine a rogue army of 100,000 ‘bots (hijacked computers) working in unison to attack a company’s transactional website

• Large exposure for clients who require their transactional systems to be available always

• Can be tied to ‘cyber extortion’ – a demand to wire money to an attacker’s bank account or suffer a massive attack (outage)

• This trend will continue due to: The simplicity of the attack Massive growth in broadband connections

which are unknowing ‘zombies’ used by bad guys

Sample ISP log for a biz under attack over a 3 week period

Page 14: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Why The Problem?Why The Problem?

The Internet’s open network• Many companies have a transactional website• Businesses collect and store customer private data

More data often collected than needed Data often Stored for too long

• Business servers (websites) are very porous and need constant care (hardening & patching)

• Tools that help hackers are readily available and shared on the Internet at no cost to malicious attackers

• Bad guys rely on the prevalence of human error Poor passwords Unchanged default settings Lack of tested back-up process No applied patches No encryption in database

Page 15: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

A Note On PCIA Note On PCI

• PCI: A security standard that includes requirements for critical protective measures:

* security management * policies and procedures * network architecture * software design

• Goal: to helps organizations proactively protect customer account data

• Developed by American Express, Discover Financial Services, JCB, MasterCard Worldwide and Visa International

Page 16: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

PCI: Watch PCI: Watch HowHow & & WhatWhat You You StoreStore

• Customer NPI Data should be encrypted in Database

• Do not store sensitive authentication data subsequent to authorization (not even if it’s encrypted) Do not store the full contents of any track from the

magnetic stripe (on the back of a card)

Do not store the card-validation code (3- or 4-digit value printed on the front or back of a payment card)

Do not store the PIN Verification Value (PVV)

Page 17: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Recent loss events:

Rogue CIO – BI Loss: A company that sold e-books online suffered are major 1st party loss, of approx $500k. Cyber Extortion – BI Loss & potential liability:E-Bank System Exploited – Cash Stolen E-Checking System Breach – BI Loss & potential liability

• Industries most at risk?24x7 modelsClient NPI is being collected, shared, processed, stored

• Lesson…cyber risk exposures can be managed and transferred (Eliminated; mitigate, accept & cede)…. RM needs a seat at the table!

Losses: Recent Real Life Breach Events

Page 18: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

What Can Be Done?What Can Be Done?

• Increase awareness of risk• Appreciate the many challenges to manage the

risks• Assess and test• Back to basics: Implement baseline safeguards

and controls• Vigilance: Update and monitor your measures

Page 19: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007
Page 20: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Strategies For Risk ManagersStrategies For Risk Managers

Loss Prevention ApproachLoss Prevention Approach

• Review Controls Surrounding People Dedicated information security personnel Background checks Proper security budget Vigilance about their jobs

• Review Controls Surrounding Processes Enterprise ISO17799 PCI audit compliance ready (or near) Policies enforced daily Employee education/training Change management processes

• Review Controls Surrounding Technology Managed firewall with IDS/IPS Hardened and patched servers Strong passwords Anti-virus software and transmission Daily backup

Page 21: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Where To Begin?Where To Begin?

• Start with a self-assessment…benchmark against known standards

Page 22: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

BCP (backup &hotsite)

Page 23: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

CyberCyber Risk Insurability Assessment Risk Insurability Assessment ProcessProcess

What is it?

A ‘quiet audit’ process of a company’s Information Security; Business Continuity; and Privacy Practices.

What is the Purpose?

To Give the Risk Manager (and their Insurer) an Objective and Independent Opinion as to the Functional Risk Profile of an Insured

How is it Conducted?

Either “On-site” or “Remote” often at the request of an Underwriter

What is the End Result?

A Summarized Written Report That Explains the Auditors Understanding of the Insured’s Environment, With Risk Profile & Mitigation Suggestions.

Page 24: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Value of the Assessment Exercise Value of the Assessment Exercise for the RMfor the RM

• Showcase Risk Mgmt Strengths Reaffirm & document due care and a prudent information

security program Good faith effort towards compliance Lessons learned from past loss/ incidents

• Illuminate Red Flags (weak security controls to improve upon)

No firewall Mis-configuration: Key Server in-front of FW No BCP/DR Plan No DR Test (many) No DB/Storage Encryption (most) Opening in the Corp Network perimeter (many) Poor Passwords No Dedicated Security Personnel/ Role No background checks

Page 25: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

New Threats, New Liabilities

State of the Privacy Insurance Market

April, 2007

Bank Perspective

Page 26: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

GLBAGLBA(Gramm-Leach-Bliley Act – Public Law 106-102)(Gramm-Leach-Bliley Act – Public Law 106-102)

Financial Services Modernization Act of 1999Financial Services Modernization Act of 1999

• Disclosure of privacy policy in regards to the sharing of information with affiliates

• When and how often the customer is notified of the privacy policy

• The ability to “opt-out” of the sharing of non-public personal information with nonaffiliated third parties

• The protection of customer information; Confidentiality, Integrity and Availability

Title V

Page 27: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

What does banking look What does banking look like?like?

Image Exchange Network

WEB

ATMs

Branches

Customer Data

Merchant Capture

Real-Time

Real-Time

ACH

Integrity and Availability of Transactions

Key Assets

Page 28: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

What are the threats?What are the threats?

Image Exchange Network

WEB

ATMs

Branches

Merchant Capture

Real-Time

Real-Time

ACH

Social Engineering

Fraudulent Transactions

Employee Mistakes

Phishing

Card Skimming

Image Modification

419 Scams

Customer Data

Integrity and Availability of Transactions

Key Assets

Page 29: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Threat MitigationThreat Mitigation

Outsource Vendor mgmt (what is a trusted vendor doing to protect your customer’s data and your banking systems), vender’s vender

People: Infosec staff vigilance; employee awareness & training

Policies: security, privacy, BCP/DR Self-Testing (Scan), Monitoring (Logs) &

Constant Updating (Patch) Two factor Authentication

Page 30: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Threat MitigationThreat Mitigation

Defense in Depth in practice

Key: Make yourself an unattractive target

Page 31: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Philadelphia, PA ~ April 11 & 12, 2007

2007 E&O 2007 E&O SymposiumSymposium

New Threats, New Liabilities:New Threats, New Liabilities:The Carrier PerspectiveThe Carrier Perspective

Lori BaileyAssistant Vice President

Professional Liability DivisionAIG/National Union

[email protected]

Page 32: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

State of the MarketplaceState of the Marketplace

• Claim Activity Regulatory Oversight Heightened Notification Requirements Aggressive Plaintiff’s Bar More Sophisticated Crime Network Dishonest Insiders Human Error

• Increased Cost of Compliance

Page 33: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Current Trends: CoverageCurrent Trends: Coverage

• Security/Privacy Liability Rogue Employee Coverage Coverage for Information Holders (Vicarious

Liability) Regulatory Claims Coverage

• Crisis Management Coverages Notification Costs/Public Relations Expenses Credit Monitoring Services

Page 34: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Current Trends: Client ProfileCurrent Trends: Client Profile

• Financial Institutions• Healthcare Providers • Colleges & Universities• Retailers• Payment Processors• Professional Services Organizations

Accountants Lawyers Insurance Brokers / Companies

• Anyone handling confidential information (personal or corporate)

Page 35: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

Current Trends: LitigationCurrent Trends: Litigation

• Class Action Claims

• Federal Oversight State Attorney General Federal Trade Commission

• International Exposures Foreign Hackers Outsourced Vendors

Page 36: New Threats, New Liabilities State of the Privacy Insurance Market  April, 2007

What’s Next?What’s Next?

• Aftermath of Significant Data Breaches

• Proposed Legislation State Federal

• New Technologies