Cyber-Attacks: Insurance Coverage for Cyber Risks and Realities Roberta D. Anderson @RobertaEsq

advertisement
Cyber-Attacks: Insurance Coverage for Cyber
Risks and Realities
Roberta D. Anderson
roberta.anderson@klgates.com
@RobertaEsq
© Copyright 2013 by K&L Gates LLP. All rights reserved.
June 25, 2014
Lloyd’s of London (Reuters) May 8, 2000
1
Agenda












The Spectrum of Cyber Risk
Practical Risk and Exposure
Legal and Regulatory Framework
What to do Before an Incident?
What to do After an Incident?
Potential Coverage Under “Legacy” Policies
Limitations of “Legacy” Insurance Policies
Technology Errors & Omissions Coverage
Cutting Edge “Cyber” Products
How to Enhance “Off-The-Shelf” Cyber Insurance Forms Through Negotiation
A Word About Vendor Contracts
Audience Q&A
THE SPECTRUM OF CYBER RISK
© Copyright 2013 by K&L Gates LLP. All rights reserved.
The Spectrum of Cyber Risk

Malicious attacks
 Advanced Persistent Threats
 Social engineering/employee sabotage
 Vruses, worms, Trojans
 DDoS attacks








Data breach
Software vulnerability (HeartBleed)
Unauthorized access (spyware)
Inadequate security and system glitches
Employee mobility and disgruntled employees
Lost or stolen mobile and other portable devices
Vendors/outsourcing (the function but not the risk) & the “cloud”
Human error
oops!!
back
link
klgates.com
5
klgates.com
6
“[T]here are only two types of
companies: those that have been
hacked and those that will be.
And even they are converging into
one category: companies that
have been hacked and will be
hacked again.”
Robert S. Mueller, III, Director, Federal Bureau of Investigation, RSA Cyber Security Conference San Francisco, CA (Mar. 1, 2012)
7
LEGAL AND REGULATORY FRAMEWORK
© Copyright 2013 by K&L Gates LLP. All rights reserved.
Legal and Regulatory Framework
 State Privacy Laws
 http://www.ncsl.org/research/telecommunications-and-information-
technology/security-breach-notification-laws.aspx
 State Consumer Protection Laws
 Federal Laws
 Gramm-Leach-Billey Act
 HIPAA/HITECH
 Federal Trade Commission Act, Section 5 (FTC v. Wyndham Worldwide Corp.)
 FCRA /FACTA/Red Flags Rule
 Foreign Laws
 PCI Data Security Standards (PCI DSS)
 Common law
back
Legal and Regulatory Framework
 SEC Guidance -- “[A]ppropriate disclosures may include”:
 “Discussion of aspects of the registrant’s business or operations that give rise to
material cybersecurity risks and the potential costs and consequences”;
 “To the extent the registrant outsources functions that have material cybersecurity
risks, description of those functions and how the registrant addresses those risks”;
 “Description of cyber incidents experienced by the registrant that are individually, or
in the aggregate, material, including a description of the costs and other
consequences”;
 “Risks related to cyber incidents that may remain undetected for an extended perid”;
and
 “Description of relevant insurance coverage.”
Five Tips to Consider When Any Public Company Might be The Next Target, http://www.klgates.com/five-tips-to-consider-whenany-public-company-might-be-the-next-target-02-11-2014
Legal and Regulatory Framework
Legal and Regulatory Framework
 NIST Cybersecurity Framework -- provides a common taxonomy and mechanism
for organizations to:
 Describe their current cybersecurity posture;
 Describe their target state for cybersecurity;
 Identify and prioritize opportunities for improvement within the context of a
continuous and repeatable process;
 Assess progress toward the target state;
 Communicate among internal and external stakeholders about cybersecurity
risk.
 The Framework is voluntary (for now)
Legal and Regulatory Framework
 NIST Cybersecurity Framework
NIST Unveils Cybersecurity Framework, http://www.klgates.com/nist-unveils-cybersecurity-framework-02-17-2014/
Legal and Regulatory Framework
back
PRACTICAL RISK AND EXPOSURE
© Copyright 2013 by K&L Gates LLP. All rights reserved.
Practical Risk and Exposure
 Breach Notification Costs/Identity Monitoring
 Computer Forensics/PR Consulting
 Loss of Customers/Revenue
 Damaged Reputation/Brand
 Regulatory Actions/Fines/Penalties/Consumer Redress
 Lawsuits & Defense Costs
 Loss of “Crown Jewels”
 Business Interruption & Supply Chain Disruption
 Drop in Stock Price/Loss of Market Share
 Potential D&O Suits (Target)
Practical Risk and Exposure
 “[T]he average total cost of a data breach for the companies
participating in this research increased 15 percent to $3.5
million”
 “The average cost paid for each lost or stolen record containing
sensitive and confidential information increased more than 9
percent from $136 in 2013 to $145 in this year’s study.”
 “However, German and US organizations on average experienced
much higher costs at $195 and $201, respectively.”
 “These countries also experienced the highest total cost (US at
$5.85 million and Germany at $4.74 million)”
 “[W]e do not include data breaches of more than approximately
100,000 compromised records in our analysis.”
WHAT TO DO BEFORE AN INCIDENT?
© Copyright 2013 by K&L Gates LLP. All rights reserved.
What to do Before an Incident?
 Pro-active management of cyber risks at the C-Suite level
 Assessment of key risks impacting the business and identifying critical
information assets
 Get a graded cybersecurity assessment
 Regular internal training on information management and IT security
 Have an incident response plan in place before a cybersecurity incident
 Pay attention to vendor contracts
 Address and mitigate risk through insurance
WHAT TO DO AFTER AN INCIDENT?
© Copyright 2013 by K&L Gates LLP. All rights reserved.
What to do After an Incident?


Look (hopefully) to the incident response plan
Notification of a security breach must be given to all or some of:



Potentially impacted individuals
State AGs / Regulators
“Breach coach” counsel should:
 Advise on who, when, and how to notify

Engage pre-vetted forensics professionals and other crisis management
responders (e.g., credit monitoring,
public relations)
POTENTIAL COVERAGE UNDER “LEGACY” POLICIES
© Copyright 2013 by K&L Gates LLP. All rights reserved.
Potential Coverage Under “Legacy” Policies





Directors’ and Officers’ (D&O)
Errors and Omissions (E&O)/Professional Liability
Employment Practices Liability (EPL)
Fiduciary Liability
Crime
 Retail Ventures, Inc. v. National Union Fire Ins. of Pittsburgh, Pa., 691 F.3d 821
(6th Cir. 2012) (DSW covered for expenses for customer communications, public
relations, lawsuits, regulatory defense costs, and fines imposed by Visa and
Mastercard under the computer fraud rider of its blanket crime policy)


Property?
Commercial General Liability (CGL)?
Potential Coverage Under “Legacy” Policies
 Coverage B provides coverage for damages because of “personal and
advertising injury”
 “Personal and Advertising Injury” is defined in part as injury
arising out of “[o]ral or written publication,
in any manner, of material that violates a person’s
right of privacy”
 What is a “Person’s Right of Privacy”?
 What is a “Publication”?
LIMITATIONS OF “LEGACY” INSURANCE
POLICIES
© Copyright 2013 by K&L Gates LLP. All rights reserved.
Limitations of “Legacy” Insurance Policies
Limitations of “Legacy” Insurance Policies
klgates.com
Limitations of “Legacy” Insurance Policies
ISO states that “when this endorsement is
attached, it will result in a reduction of
coverage due to the deletion of an
exception with respect to damages
because of bodily injury arising out of loss
of, loss of use of, damage to, corruption of,
inability to access, or inability to manipulate
electronic data.”
Limitations of “Legacy” Insurance Policies
Limitations of “Legacy” Insurance Policies
Limitations of “Legacy” Insurance Policies
Limitations of “Legacy” Insurance Policies
 Zurich American Insurance Co. v. Sony Corp. of America et al.
TECHNOLOGY ERRORS & OMISSIONS COVERAGE
© Copyright 2013 by K&L Gates LLP. All rights reserved.
Technology E&O Coverage
 Essential for a provider of e-commerce-related solutions
 Covers
 Errors & Omissions in the Provision of Technology Services
 Failure of Technology Products to Serve Their Purpose




But there are limitations
Triggered By a “Claim” That Alleges An Act or Omission
May Exclude Security Beach or Unauthorized Access to Information
May Not Include Breach Notification Costs, Which is Viewed As More of a “FirstParty” Loss
CUTTING EDGE “CYBER” PRODUCTS
© Copyright 2013 by K&L Gates LLP. All rights reserved.
Specialty “Cyber” Policies – Third Party
 Privacy And Network Security
 Provides coverage for liability (defense and indemnity) arising out of data
breaches, transmission of malicious code, denial of third-party access to the
insured’s network, and other network security threats
 Regulatory Liability
 Provides coverage for liability arising out of administrative or regulatory
proceedings, fines and penalties
 Media Liability
 Provides coverage for liability (defense and indemnity) for claims
alleging infringement of copyright and other intellectual property rights
and misappropriation of ideas or media content
Specialty “Cyber” Policies – First Party
 Information Asset Coverage
 Coverage for damage to or theft of the insured’s own systems and hardware,
and may cover the cost of restoring or recreating stolen or corrupted data.
 Network Interruption And Extra Expense (and CBI)
 Coverage for business interruption and extra expense caused by malicious
code, DDoS attacks, unauthorized access to, or theft of, information, and other
security threats to networks.
 Extortion
 Coverage for losses resulting from extortion (payments of an extortionist’s
demand to prevent network loss or implementation of a threat)
 Crisis Management
HOW TO ENHANCE “OFF-THE-SHELF” CYBER INSURANCE
FORMS THROUGH NEGOTIATION
© Copyright 2013 by K&L Gates LLP. All rights reserved.
back
klgates.com
Data Breach Example 1
Data Breach Example 1
Data Breach Example 2
Data Breach Example 2
Data Breach Example 2
Data Breach Example 2
Network Security Example 1
Network Security Example 1
Network Security Example 2
Network Security Example 2
Network Security Example 3
Network Security Example 3
TIPS For A Successful Placement
Remember Dave?
■
Privacy And Network Security
■
Regulatory Liability
■
Media Liability
■
Information Asset Coverage
■
Network Interruption And Extra Expense (and CBI)
■
Extortion
■
Crisis Management
TIPS For A Successful Placement
■
Embrace a Team Approach
■
Understand the Risk Profile
■
Review Existing Coverages
■
Purchase Cyber Coverage as Needed
■
Remember the “Cyber” Misnomer
■
Spotlight the “Cloud”
■
Consider the Amount of Coverage
■
Pay attention to the Retroactive Date and ERP
■
Look at Defense and Settlement Provisions
■
Engage Coverage Counsel
BEWARE
THE
FINE
PRINT
“A well drafted policy will reduce
the likelihood that an insurer will
be able to avoid or limit
insurance coverage in the event
of a claim.”
Roberta D. Anderson, Partner, K&L Gates LLP (June 25, 2014)
A WORD ABOUT VENDOR CONTRACTS
© Copyright 2013 by K&L Gates LLP. All rights reserved.
A Word About Vendor Contracts
■
Be specific
■
■
■
■
■
Who is responsible for securing stored data? Data in motion?
Reference objective standards, e.g., Version 5 of the SANS Institute Critical Security
Controls http://www.sans.org/critical-security-controls
Who has access – and to which parts –to various parts of the organizations
network?
What are the required cybersecurity standards?
Dovetail Vendor Contracts With Insurance Contracts
AUDIENCE Q&A
© Copyright 2013 by K&L Gates LLP. All rights reserved.
Linkedin: robertaandersonesq
Twitter: @RobertaEsq
Insurance Thought Leadership
60
Download