Network Security & Privacy Liability Presented by

advertisement
New Jersey Chapter
Network Security & Privacy Liability
Assessing the Risk
June 14, 2011 Chapter Meeting
Steve Yesko, ARM
Lowers & Associates
Jeff Kulikowski
AXIS Pro
Meredith Schnur
Wells Fargo
Insurance Services
Risk Mitigation Agenda
•
•
•
•
•
•
•
•
•
•
•
Cyber Risk vs. Data Breach
Types of Breach
Evolution of the Exposure
Top 10 Incidents of 2010
Top 10 Unsolved Crimes
Today Risk Landscape
Organizational Risk Trends
2011 Forecast
IT Security Testing - 3 Prong Approach
IT Risk Mitigation Measures - Be Prepared
Information Resources
Cyber Risk vs. Data Breach
• Cyber Risk Coverage
– Addresses hazards such as unauthorized website
access, on-line libel, data loss and repairs to
databases after system failures.
• Data Breach or Privacy Coverage
– Covers the cost of notification and credit
monitoring services for affected persons, PR
expense to address reputational harm, breach
investigation, legal fees and compensatory
damages, judgments and settlements.
Types of Breach
•
•
•
•
•
•
Theft or Loss
Inappropriate Handling
Inadvertent Exposure
Misuse of Access (Insider Threat)
Unauthorized Access (External Attack)
System Compromise (Malware)
Evolution of the Exposure
• From a kid in the basement of parents home to
highly sophisticated organized crime networks
• From IT/computer related to Internet/web-based
• From theft of money to theft of information
• From outside / in to inside / out
• From legal action brought by consumers to
legal action by regulators
• From expenses to secure network/servers to
expenses for state notification laws
• From an IT issue to a Boardroom issue
• From a national to an international problem
The Biggest Information Security
Incidents of 2010
#10. Affinity Health Plan
Breach, involving 409K records, occurred when copier was returned w/o hard disk erasure; Reported by AHP to comply w / HHS mandates
#9. WellPoint/Anthem BlueCross
Company’s insurance application website was compromised w / faulty authentification code upgrade putting 470K applicant records at risk
#8. CitiGroup
Approximately 600K customers were sent annual tax documents w / SSN printed on outside of envelope (mimicked mail routing number)
#7. Ohio State University
Server housing 760K unencrypted PII records of current/former students, faculty, staff, contractors exposed during hack; No evidence of
data theft
#6. South Shore Hospital
Three boxes of tapes, containing 800K records containing PII, PHI, financial info of hospital community, were lost while being transported for destruction
#5. Lincoln National Financial Securities
Portfolio management system, housing data for 1.2M customers, compromised when actual user name/password were printed in brochure and on public site
#4. AvMed Health Plans
1.2M records of current and former subscribers and their dependents compromised when two unencrypted laptops were stolen from corporate HQ
#3. Gawker
1.3M user email address and passwords stolen in hack; 250k cracked IDs/passwords posted on-line, most common among them, 123456
#2. Education Credit Management Corp.
Safes stolen from ECM offices containing unencrypted portable media (later recovered by police) with 3.3M student loan recipient/applicant info
#1. Netflix
Data sets containing anonymized movie rating and preference information for over 100M subscribers is voluntarily released to contest participants
Source: Software, Information & Network Security News
Top 10 Unsolved
Computer Crimes
#10. The WANK Worm (Oct. 89; first hacktivist attack)
#9. UK Ministry of Defense Satellite Hack (Feb. 99)
#8. CDUniverse Credit Card Breach (Jan. 00)
#7. USN Military Source Code Theft (Dec. 00)
#6. Anti-DRM Hack (Oct. 01; Windows Media)
#5. Dennis Kucinich on CBSNews.com (Oct. 03)
#4. Hacking your MBA App (Mar. 06)
#3. The 26,000 Site Hack Attack (Winter 08)
#2. Hannaford/Sweetbay Breach (Feb. 08)
#1. Comcast/Network Solutions Redirect (May 08)
Source: PC Magazine
Today's Risk Landscape
• Data breaches increased significantly in 2010
– ITRC's 2010 Breach Report cited 662 reported breaches
– An increase of 33% over 2009
– Paper Breaches: 20% (no mandatory reporting
requirement)
– Insider Theft:
15.4% (doubled since 2007)
– Hacking:
17% (up 3%)
– Data on the Move, Accidental, Subcontractor: 34.3%
• Threat Volumes are on the Rise
– 2005 - 330,000 unique malware samples;
38 web threats per hour
– 2008 - 16,495,000 unique malware samples;
1,883 web threats per hour
• Threat Vectors are Internet-Based
– 92% now arrive via the Internet (Websites, Links, Email)
– 8% arrive via file transfer (removable media)
Today's Risk Landscape
(cont'd)
• The Underground Economy is More Profitable
–
–
–
–
$100 billion per year marketplace
Malware: $50 - $3,500
Email Addresses: $0.001 per Address
An hour of usage on a Botnet of 8,000 to 10,000 computers:
$200
• Email Threats Continue to Increase
– 115 billion spam messages per day
– Targeted Phishing Attacks (Spearphishing, Whaling)
• Web and Application Threats are Growing
– 450,000 SQL/XSS Injection Attempts per Day
– DNS Changers Re-Directing Users to Malware
• Mobile Threats Being Introduced
– With PC-like Vectors
• Botnets are Proliferating
– In 2008, 34.3 million PCs were infected with bot-associated
malware
Phishing
•
Phishing targets by
Industry:
–
–
–
–
–
–
Financial Institution 50%
Credit Card
19%
Auction
11%
Government
7.5%
On-line Payment 5.7%
On-line Shop
4.9%
Country of Origin of Phishing Emails
•
•
•
•
•
Phishing = Deceptive emails
Spearphishing = Targeted phishing
Pharming = DNS based phishing
SMiShing = Targets cellular texting
Bluesnarfing = Bluetooth
connections
Source: IBM X-Force 2010 Trend Statistics
Country of Origin for Embedded Web Links
The Cyber Crime Black Market
Financing/Money Laundering
Launder Money
Launder Money
Launder Money
Launder Money
Launder Money
Monetize Information
Monetize Information
Monetize Information
Monetize Information
Monetize Information
Information/Identity/Intellectual Property Auctions
Retrieve Information
Retrieve Information
Retrieve Information
Retrieve Information
Retrieve Information
Attack Target
Attack Target
Attack Target
Attack Target
Attack Target
Botmasters (Collectors & Brokers)
Create Propagation/
Attack Vector
Create Propagation/
Attack Vector
Create Propagation/
Attack Vector
Create Propagation/
Attack Vector
Create Propagation/
Attack Vector
Create Exploit
Create Exploit
Discover Vulnerability
Discover Vulnerability
Toolkit Marketplace
Create Exploit
Create Exploit
Create Exploit
Vulnerability Marketplace
Discover Vulnerability
Discover Vulnerability
Discover Vulnerability
Organizational Risk Trends
• Advanced Persistent Threats
New!
• Strong Rising Threats
– Unstable Third Party Providers
– Insecure Trading Partners
• Rising Threats
– Malicious/Disgruntled Insiders
– Careless/Overworked Employees
– Reduced Security Budgets
• Steady Threats
– Remote Workers
– Software Downloading
Why Risk Management?
• IT + Business + Financial Risk
• Part of broader governance, risk or
compliance initiative
• IT => Information Security focus
• Regulatory Compliance
• Measuring threats and costs
Mitigating Cyber Risk
•
•
•
•
•
Avoid it
Ignore it (we are not a target)
Accept it as part of doing business
Manage it (controls/processes)
Transfer it (insurance, escrow)
Risk Mitigation Measures
• IT/Information Security Risk Assessments
• Internal / External and Independent Testing:
– Vulnerability (Scan) Analysis (network, application, database)
– Penetration Testing (same, plus client-side)
– Controls Testing (SAS-70, ISO-2700n, CoBIT, PCI, BITS FISAP)
• Implement, Test, and Continuously Improve:
–
–
–
–
–
–
Data Classification & Protection Measures
Training & Awareness
Logging & Monitoring
Patch/Configuration Management
Network, Server, and Endpoint DLP
AV, IDS/IPS, Proxies & Filters, DSRA
• Develop WISP - BR Team, BR Plan, COOP Approach
• Compliance Audits
IT Security Testing
A Three-Pronged Approach
2011 Forecast
•
•
•
•
•
•
•
•
•
Sophisticated, blended, APTs for the FIs
More smaller, reported breaches elsewhere
Social networking policy implementation rises
Ransomware and ransom attacks will grow
Data minimization and cloud solutions advance
Mobile data is ripe for the picking
Low-tech theft of data/devices increases
Alternative O/S attacks will increase
Microsoft still targeted; Web 2.0 is here to stay
2011 Forecast
•
•
•
•
•
•
•
•
•
More prevalent/deceptive social engineering methods
Privacy awareness / breach preparedness advances
Third-party data collection faces greater scrutiny
The underground economy will continue to flourish
Identity theft and spam will increase worldwide
Continuing exposure due to lost devices
Data encryption seen as means to compliance ends
Federal breach notification legislation comes in 2012?
Collaboration + Openness = Vulnerability to breach
Information Resources
• PGP/Ponemon Study (www.ponemon.org)
• Verizon Data Breach Investigations Report
(www.verizonbusiness.com)
• IBM X-Force Trend & Risk Report (www.ibm.com)
• Betterley Report (www.betterley.com)
• U.S. Dept. of Health & Human Services (www.hhs.gov)
• Privacy Rights Clearinghouse (www.privacyrights.org)
• ePlace (www.eplacesolutions.com)
• Sedona Conference Working Group on eDiscovery
(www.thesedonaconference.org)
• BITS FISAP (www.bitsinfo.org)
• Identity Theft Resource Center (ITRC) Report (www.idtheftcenter.org)
• Internet Crime Complaint Center (IC3) Report (www.ic3.gov)
• Center for Strategic & International Studies (CSIS) (www.csis.org)
• Forrester Research (www.forrester.com)
Stephen Yesko, ARM
VA Office: (540) 338-7151
NY Office: (718) 775-9198
syesko@lowersrisk.com
www.lowersrisk.com
AXIS Capital Holdings
Limited
Security/Privacy Coverage- An
Underwriting Perspective
Jeff Kulikowski:
Axis Pro
Vice President, Regional Underwriting Manager
Security/Privacy Coverage- An Underwriting
Perspective
 Agenda




Security/Privacy Coverage Components and Coverage
Triggers
Known Breach Events
Underwriting Overview
Q&A
What Does The Coverage Provide?
 Proactive coverage grants and carrier support services that
assist an Insured at the outset of a data breach, including:
 Public Relations assistance
 Costs to issue notification letters to affected (actual or
potential)individuals
 Credit Monitoring capabilities to affected individuals
 If a breach escalates into claim for actual damages, then the
policy provides reimbursement for defense costs and damages,
subject to policy provisions
 Coverage is also available for the Insured’s loss of income, or
costs to recreate/repair/replace data lost in the case of a
Security Event
Security/Privacy Coverage- Common Insuring
Agreements
 Base Form Coverage- access to full aggregate limit



Security and Privacy Liability
Media Liability (online/offline)
Computer System Extortion
 Sublimited Coverage




Crisis Management Expense
Regulatory Action Coverage
Crisis Fund
PCI-DSS Fines and Penalties Coverage
 First Party Coverage


Business/Network Interruption
Data Recovery/Information Asset Coverage
Understanding the Coverage- 1st Party v 3rd Party
 First Party Coverage: direct reimbursement to the Insured for costs
they incur for the following
- Crisis Management Expenses
- Data Restoration/Information Asset
- Business/Network Interruption
- Regulatory Defense/Fines and Penalties
- Cyber Extortion
 Third Party Coverage: defense costs and damages resulting from the
following, which cause a 3rd Party financial loss
- Security Liability
- Privacy Liability
Security/Privacy Insurance- Coverage Triggers
 Accidental release or unauthorized disclosure of Personally
Identifiable Information, Corporate Confidential Information or
other confidential data
 Unauthorized Access to or Unauthorized Use of Protected Data
on an Insured’s Computer System that directly results in theft,
alteration, destruction, deletion, corruption or damage of
Protected Data
 failure to prevent a party from accessing a computer or network
system under the control of the Insured, when the party has the
intent to deny or disrupt service, cause network functionality to
fail, transmit malicious code via the Insured’s networks, or
deny/disrupt access to online services or computer system
 Transmitting or receiving Malicious Code via the Insured’s
Computer system
Commonly Used Policy Terms
 Personally Identifiable Information (PII): SSN,
Medical/Healthcare data, Driver’s License #/State ID, Financial
Information(Credit Card#, Debit Card#), other non-public
information
 Corporate Confidential Information: info subject to a
confidentiality agreement/NDA
 Malicious Code: computer virus, Trojan horse, or other code,
script or software program designed to damage, harm if infect a
computer
 Privacy Regulations: HIPAA, Gramm-Leach-Bliley, etc
 Data Breach: a loss of PII or Corporate Confidential Information,
regardless of medium or method
Typical Policy Provisions
 Common Carvebacks to Policy Exclusions and Definitions





Rogue Employee Coverage Carveback to the
fraudulent/intentional acts exclusion
Misappropriation of Trade Secrets Carveback
Employee Retirement Income Security Act of 1974 Carveback
Employee Carveback to the Insured vs Insured Exclusion
Consumer Redress Fund to be included in the definition of
Damages
 Common Exclusions




Infringement of Patent
Employment Practices Liability
Unsolicited faxes, email, or other communication
Unlawful collection or acquisition of Protected Data
Known Breach Events
 TJX Companies



94,000,000 Affected Individuals
States Attorneys General V. TJX Companies- total of $9.5M spend
establishing Discretionary Funds, data security Funds, and
reimbursement of Plaintiff Attorney Fees
$40M settlement Pending with VISA
$13.5M Consumer Class Action Settlement in Massachusetts
 Heartland Payment Systems


130,000,000 Affected individuals
Numerous cases and settlements pending through the US with
Consumers, Financial Institutions, Vendors, Payment Processors,
etc
Notable Costs to date include $60M settlement with VISA, $3.5m
settlement with American Express
Known Breach Events- continued
 CardSystems


40,000,000 credit card numbers lost as a result of security
breach/hacking incident
Class Action suit filed in 2005, but case was eventually
closed as CardSystems filed Chapter 11 on 5/12/2006
 T-Mobile/Deutsche Telekom

17,000,000 Customers’ data affected due to lost disk drive
 BNY Mellon Shareowner Services

12,500,000 affected individuals due to lost backup tape
 American Honda Motor Company

4,900,000 names, addresses, e-mail addresses, user
names and VINs exposed from email list
SOURCE:www.DataLossDB.com
How is Security/Privacy Coverage Underwritten?
 Industry/Class of Business
 Security Controls and Procedures
 Privacy Policy/Internal Controls
 Other Risk Controls
 Litigation Review
 Financial Analysis
Industry and Litigation Potential Analysis
 High Risk Industries include:
- Healthcare
- Finance
- Retail
- Leisure/Entertainment
- Secondary and Higher Education
- Utilities
 All other Industries still at risk, depending on the PII or
Confidential Data held
Security/Privacy Risk Control Analysis
 Information Security and Privacy Policy
 Business Continuity/Disaster Recovery Plan
 Security/Privacy Compliance with Industry Standards
 Employee Restrictions for Data Access, and Data Classification
Schemes
 User Profile Management
 Physical Security Controls
 Encryption methodology
 Data Storage Methodology
 Use of 3rd party applications(Firewall/IPS/IDS)
Other Risk Controls
 Vendor management
- Identification of outsourced activities
- Indemnification/Hold Harmless provisions
- Vendor Selection and Auditing Procedures
- Insurance Requirements
 Regulatory Compliance
 Recent Changes to Management or Auditors
 Other Risk Management Controls
Litigation Review
 Past Claims History
 Public Search of Breach History
 Claims within the Insured’s Industry
 State Requirements for Privacy Breach Response
 Review of Pending Industry Regulations
Financial Review
 Revenues Levels and Projections
 Income statement
 Balance Sheet
 Cash Flow Statement
 Were any key accounting conventions changed?
Axis Capital Holdings Ltd.
 Founded in November 2001 ($1.7b start-up capital)



Strong balance sheet - $5.6 Billion of Shareholders Equity
$3.5 Billion in Premium for the FYE 2010
No legacy exposures
 IPO July 2003 – NYSE: AXS
 Rated A XV (AM Best) ; A+ Strong (S&P) (Upgrade February
2009)
 Specialty Lines Insurance and Treaty Reinsurance
 AXIS website: www.axiscapital.com
Wells Fargo Insurance Services
NJ RIMS Meeting – June 14, 2011
Network Security & Privacy Liability
Presented by:
Meredith Schnur
Professional Risk Group
Wells Fargo Insurance Services
Agenda
 Regulatory Environment
 What Should You Be Asking?
 Vendor Management
 Gaps in Traditional Insurance
 Resources
 eRisk Hub
 Primary Markets
 Marketing & Underwriting Process
Wells Fargo Insurance Services
Legal Issues & The Regulatory Environment
Legislation has now imposed affirmative duties on companies as to
how they handle data, principally client/customer information:

Gramm Leach-Bliley Act: Requires financial institutions to safeguard customers’ records
and information against unauthorized access.
Imposes major privacy and security
requirements on financial services companies

Health Insurance Portability and Accountability Act (HIPAA): Healthcare organizations
required to safeguard individually identifiable health information. Imposes penalties on
organizations that violate HIPAA (further amended by the HITECH Act)

California SB1386: A California law requiring companies to notify their CA customers and
employees of computer security breaches. The law applies to any business that stores
customer and employee information electronically even if the company is not based in the
Golden State.

Privacy Breach Notification Laws: Spreading of California SB 1386; adopted by 46 states
as of December 2010. Duty to notify customers where consumer/customer information has
been compromised (electronic or non-electronic means, state legislation varies)

Massachusetts Privacy Law 201 CMR 17.00: This law is the first state law to require
specific technology when protecting personal information. If you do business with residents
in MA or have employees that reside in MA, compliance is mandatory by March 1, 2010.
Wells Fargo Insurance Services
Legal Issues and The Regulatory
Environment

PCI Security Standards: The standards globally govern all merchants and organizations
that store, process or transmit cardholder data. PCI security standards are technical and
operational requirements set by the Payment Card Industry Security Standards Council (PCI
fines not generally covered under insurance policies).

FACTA (Fair and Accurate Credit Transactions Act): Prohibits businesses from printing
more than 5 digits of any customer’s credit card number or card expiration date on any
receipt issued at a point of sale. For machines in use before 1/1/05, the merchant has 3
years to comply. For machines in use after 1/1/05, the merchant has one year to comply.

Red Flag Rules: Established by FACTA, requires financial institutions or creditors to
develop and implement an Identity Theft Prevention Program in connection with both new
and existing accounts. The program must include reasonable policies and procedures for
detecting, preventing and mitigating identity theft.

Federal HITECH Act – health plans, health care providers and health care clearinghouses
(ie. Covered entities), among other things, must review and update their business associate
agreements, as well as their privacy and security policies and procedures. Requires that any
data breach event exceeding 500 records be reported to the Department of Health and
Human Services.
Wells Fargo Insurance Services
What Should You Be Asking?

Have we analyzed our cyber liabilities?

What legal rules apply to the information we maintain or that is kept by vendors,
partners and other third parties? The laws surrounding breaches are complex.

Have we assessed our legal exposure to governmental investigations?

Have we assessed our exposure to suits by our customers, vendors or suppliers?

Have we protected our organization in contracts with vendors?

What laws apply in different states and countries in which we conduct business?

Do we have adequate staffing to reasonably maintain and safeguard our important
assets and processes?

Have we prepared an incident response plan and business continuity plan?

Do we have a documented, proactive crisis communications plan?
It is critical to have a solid incident response plan in
place prior to any security or privacy breach.
** Questions supplied by the “The Financial Impact of Cyber Risk” Publication – American National Standards
Institute (ANSI) and Internet Security Alliance.
Wells Fargo Insurance Services
Vendor Management & Requirements
 IT/Software Companies

Request Tech E&O to include network security/privacy coverage

Some Tech E&O policies have security/privacy exclusions
 Other Business Services – Payroll, Auditors

Request appropriate E&O coverage to include network security/privacy
 Credit Card Processors/Acquiring Banks

Request Network Security/Privacy Coverage
 Other Vendors that interact with your systems or sensitive
information, or handle information on your behalf

Request Network Security/Privacy Coverage
Wells Fargo Insurance Services
Gaps in Traditional Insurance
Why is this not covered elsewhere?

Commercial General Liability Insurance: Typically covers bodily injury and property damage to
“tangible” property. Data and software are considered to be “intangible”

Property Insurance: Typically responds to “direct physical loss” by a covered peril (ie. fire,
windstorm). Intangible property is not covered under Business Interruption and Extra Expense
coverage.

Fidelity/Crime Insurance: Typically provides coverage to the organization for losses resulting
from the theft of money, securities and “other tangible property.” Information theft is not covered
under a standard fidelity bond.
“Other property” does not include proprietary information,
confidential information or copyrights, trademarks, etc.

Professional Errors & Omissions: Typically only covers financial loss arising out of professional
services to others. Computer attacks do not fall within the provision of “professional services,” and
some E&O policies will exclude coverage caused by “unauthorized access.”

Technology Errors & Omissions: Covers only financial loss arising out of technology services
performed for others. If in the provision of technology services, your negligence leads to an
unauthorized access or transmission of a virus, coverage would apply. However, if an employee
commits an intentional act or if an outside hacker, unrelated to services provided by you, causes a
customer to suffer a financial loss, no coverage would apply under a typical technology errors &
omissions policy. Most Technology E&O policies can be extended to cover network security and
privacy related exposures.
Wells Fargo Insurance Services
Resources
 www.privacyrights.org – data breach chronology recorded
by year and by industry class
 www.ponemon.org – updated statistics on privacy breaches
(see following page)
 www.hhs.org – regulations and breaches in excess of 500
records as mandated by HITECH
 www.eriskhub.com – information portal for WFIS clients
Wells Fargo Insurance Services
eRisk Hub
 Learning Center
 News Center
 Incident Road Map
 Free Breach Coach
 Resource Directory
 Risk Manager Tools
Wells Fargo Insurance Services
Primary Markets
Markets*
ACE USA
Best Rating
“A+” XV
Allied World/Darwin Group
“A” XV
Arch
“A” XV
Axis
“A” XV
Beazley USA
Chartis
Chubb Group
“A” VIII
“A” XV
“A++” XV
CNA
“A” XV
Digital Risk Managers (MGA writing on Lloyds paper – Brit, Kiln, ACE)
“A” XV
Hartford
“A” XV
Hiscox USA
“A” VIII
Ironshore
“A-” XIII
London Markets (Beazley, Hiscox, Brit, Kiln, ACE, Barbican, CFC)
“A” XV
One Beacon
“A” XV
Philadelphia
“A” XV
RLI
“A+” X
Zurich North America
“A” XV
XL
“A” XV
* - Many additional carriers will offer this coverage on an excess basis
Wells Fargo Insurance Services
Marketing & Underwriting Process
Step 1:
Evaluation of Exposures:
Consultation to determine
exposures – First Party, Third
Party and/or Privacy
Step 2:
Required Applications and/or
Assessment Completed
Step 3:
Marketing Process: Submit
application to selected markets to
solicit proposals
Step 4:
Proposal Analysis and Discussions
Step 5:
On-line Security Assessment
and/or Conference Call with
Insurer
Step 6:
Binding the Coverage
Wells Fargo Insurance Services
Download