Managing Cyber Risks Threats, Risk Management & Insurance

advertisement
Managing Cyber Risks
Threats, Risk Management & Insurance Principles
Brian J. Courtney, RPLU, AAI
The Safegard Group, Inc.
100 Granite Drive, Suite 205
Media, PA 19063
610.892.7688
bcourtney@safegardgroup.com
Legal Disclaimer
This presentation is advisory in nature and necessarily
general in content. No liability is assumed by reason of
the information provided.
Whether or not or to what extent a particular loss is
covered depends on the facts and circumstances of the
loss and the terms and conditions of the policy as issued.
The precise coverage afforded is subject to the terms and
conditions of the policies as issued.
Brian J. Courtney, RPLU, AAI
Brian Courtney joined The Safegard Group, Inc. in April 2005 and serves as a Producer and the Healthcare Practice Leader for the company.
He is primarily responsible for the direction of client services to the healthcare industry.
Brian began his career at the height of the medical malpractice crisis. Working with a large regional insurance broker, Brian served with the
healthcare practice leader helping hospital systems and physician groups obtain medical malpractice coverage.
Prior to joining The Safegard Group, Brian joined a large national insurance brokerage firm where he gained considerable experience in
healthcare risk management serving the needs of large physician groups, long-term care facilities, home healthcare providers, and allied
health professional organizations.
Brian has completed the Registered Professional Liability Underwriter (RPLU) program, which was developed by Professional Liability
Underwriting Society as a specialized curriculum completely dedicated to professional liability risk management. Professionals who wish to
obtain the RPLU designation are required to complete a rigorous, 13-Course curriculum comprised of eight core courses and five
specialization courses. Brian chose to specialize in the following areas:
•
•
•
•
•
Advanced Healthcare Professional Liability
Cyber Risk
Employment Practices Liability
Directors & Officers Liability
Crime
As it suggests, RPLU professionals are recognized as having the highest level of professional liability expertise to help their clients manage
their risk and protect their assets.
Currently, Brian is helping many of his clients with Cyber Risk Management initiatives, such as Risk Assessments, Data Breach Incident
Response Planning, Contractual Risk Transfer, Insurance Protection and a host of other related services.
Brian lives in Downingtown, Pennsylvania with his wife Erin and three kids, Aidan, Carter & Chase. He is active in the community volunteering
his time with the Lionville Youth Soccer Association and Brandywine Health Foundation. He is also an avid fitness/thrill seeker recently
competing in the Spartan Races, which was voted the 2012 Best Obstacle Course Race by Outside magazine.
Brian Courtney
Expert in Risk Management and Loss Prevention???
Big believer that you should avoid risk
AT ALL COSTS
True or False
Large corporations are typically the targets for hackers
FALSE
A joint study by the U.S. Secret Service and Verizon Communications’
forensics analysis unit paints a frightening picture. 482 of the 761 data
breaches the unit investigated in 2010—63%—occurred at companies
with 100 or fewer employees.
73% percent of small-to-middle-sized companies experienced a cyber
attack in 2010, and 30% of those attacks were extremely effective,
according to Symantec, a software security developer.
True or False
Small businesses (less than 100 employees) are required to abide by data breach laws
TRUE
From the Federal Trade Commission website:
For many companies, collecting sensitive consumer and employee
information is an essential part of doing business. It’s your legal
responsibility to take steps to properly secure or dispose of it. Financial
data, personal information from kids, and material derived from credit
reports may raise additional compliance considerations. In addition, you
may have legal responsibilities to victims of identity theft, regardless of
the size of your company or your line of work.
True or False
Certain industries have to worry about Cyber Security risks
FALSE
While I would agree that certain industries are more
at risk than others, every industry holds sensitive data
in some form or another. Also there is more to Cyber
risk than just a data breach. Therefore, all industries
have Cyber Security risks.
What Are Cyber Risk?
•
•
•
•
•
•
•
•
Violation of privacy policies
Transmission of viruses to other systems
Programming errors
Theft, corruption, or destruction of data or
computer systems
Hacking
Abuse of access to networks by employees
Copyright or trademark infringement
Denial of Service attacks
Source: Professional Liability Underwriting Society
www.plusweb.org
What Activities Create Cyber Risk?
•
•
•
•
•
•
•
•
•
•
•
•
•
Data storage on networks
Credit card processing
Online payment processing (other than CCs)
Internet connectivity
E-commerce
Business websites and Internet advertising
Customer forums and support (help) message boards
Internet Service Providers
Website Design
Development of hardware and software
Providing content or media
Consulting
Providing technical services, equipment and support
Source: Professional Liability Underwriting Society
www.plusweb.org
Who Regulates the Cyber World?
•
•
•
•
•
•
•
•
Federal Trade Commission (FTC)
Federal Bureau of Investigation (FBI)
Fair and Accurate Credit Transaction Act (FACTA)
Gramm-Leach-Bliley Services Modernization Act
Health Insurance Portability & Accountability Act (HIPAA)
Health Information Technology for Economic and Clinical Health (HITECH)
Sarbanes-Oxley Act (SOX)
State Privacy Breach Legislation
Source: Professional Liability Underwriting Society
www.plusweb.org
Cyber Laws
•
•
•
•
Copyright Law – Digital Millennium Copyright Act
Trademark Law – Lanham Act
Defamation
Privacy – HIPAA/HITECH, GLBA, State Laws
Source: Professional Liability Underwriting Society
www.plusweb.org
The Risks Today
Websites
IP Infringement &
Libel
Privacy
Risk
Cyber Exposures – First Party Risks
•
•
•
•
•
Data Storage
Business Interruptions
Fraud & Theft
Extortion
Crisis Management
Source: Professional Liability Underwriting Society
www.plusweb.org
Cyber Exposures – Third Party Risks
Intellectual Property
• Copyright
• Trademarks
• Trade secrets
• Patents
Privacy & Customer Data
• Security Breaches
• Liability
• Phishing & Pharming
Source: Professional Liability Underwriting Society
www.plusweb.org
Professional E&O
• Internet provider
• App. service provider
• Web hosting
• Network equipment
• Programmers
• Website Designers
• Data warehouses
• Consultants
Personal Identifiable Information (PII)
Definition:
as used in information security, refers to information that
can be used to uniquely identify, contact, or locate a single
person or can be used with other sources to uniquely
identify a single individual.
First or Last name in combination with
–
–
–
–
Social Security number
Driver’s license number
Financial Account number
Credit, Debit, or payment card
Protected Health Information (PHI)
As defined by HIPPA
“any information, whether oral or recorded in any form or
medium” that
• Is created or received by a health care provider, health plan, public
health authority, employer, life insurer, school or university, or
healthcare clearinghouse, and
• Relates to the past, present, or future physical or mental health or
condition of an individual; the provision of health care to an
individual; or the past, present, or future payment for the
provision of health care to an individual
What Is a Data Breach?
Unauthorized access to
protected information
–
–
–
–
Hacking
Rogue Employees
Negligence
Rogue Vendors
The Value of Stolen Data
Symantec Corporation; “Report on the Underground Economy, July ’07 – June ‘08
Data Breach Example
Date Made
Public
Name (Location)
Number of
Records
February 12, 2011
Cincinnati Children’s Hospital
60,000
Type of Breach
Mobile Device
An employee’s newly-issued, unencrypted laptop was stolen out of
a car. Although the covered entity had a policy of encrypting its
computers, an investigation revealed that new computers are not
encrypted before they are given to employees. The laptop
contained the protected health information (PHI) of approximately
60,000 individuals. The PHI stored on the laptop included names,
medical record numbers, and services received at the covered
entity. Following the breach, the covered entity notified its clients
by letter of the incident, placed notice on various websites and in
The Cincinnati Enquirer, and established a new internal procedure
whereby all new computers would be encrypted before they are
given to employees.
Source: Department of Health & Human Services
www.HHS.gov
Data Breach Cost Calculation
Forensic Investigation:
Security Remediation:
Data Breach Law Legal Guidance:
eDiscovery Litigation:
Customer Notification:
Call Center:
Credit Monitoring:
ID Fraud Remediation:
Public Relations Service:
HHS Fines:
State AG Fines:
Legal Defense & Damages:
$
$
$
$
$
$
$
$
$
$
$
$
TOTAL:
$1,940,712
Source: eRiskHUB
www.eriskhub.com
32,200
112,200
10,000
160,998
60,998
4,575
152,500
60,998
20,000
750,000
500,000
76,248
Another Data Breach Example
Date Made
Public
May 16, 2008
Type of Breach
Stationary Device
Name (Location)
Number of
Records
Chester County School District
55,000
A 15-year-old student gained access to files on a computer at
Downingtown West High School. Private information,
including names, addresses and Social Security numbers, of
more than 50,000 people were accessed. The student
apparently used a flash drive to save the personal data of
about 40,000 taxpayers and 15,000 students.
Source: Privacy Rights Clearinghouse
A Chronology of Data Breaches
www.privacyrights.org
Data Breach Cost Calculation
Forensic Investigation:
Security Remediation:
Data Breach Law Legal Guidance:
eDiscovery Litigation:
Customer Notification:
Call Center:
Credit Monitoring:
ID Fraud Remediation:
Public Relations Service:
FTC Fines:
State AG Fines:
Legal Defense & Damages:
$
$
$
$
$
$
$
$
$
$
$
$
TOTAL:
$1,761,625
Source: eRiskHUB
www.eriskhub.com
75,000
155,000
10,000
0
55,000
4,125
137,500
55,000
20,000
750,000
500,000
0
One More – Manufacturing???
Date Made
Public
Name (Location)
Number of
Records
February 13, 2012
Combined Systems
Unknown
Type of Breach
Hacking
A hacker or hackers accessed the Combined Systems website
and shut it down. The hackers claim to have struck in honor
of the anniversary of the February 14, 2011 Bahrain uprising
and to have wiped out the company's web servers.
Administrator logins, customer data, and emails were posted
online.
Source: Privacy Rights Clearinghouse
A Chronology of Data Breaches
www.privacyrights.org
2011 Data Breaches by Industry
Other
16%
Non-Profit
3%
Medical
34%
Government
14%
Education
11%
Retail
15%
Financial Services
8%
0%
5%
10%
Source: Privacy Rights Clearinghouse
A Chronology of Data Breaches
www.privacyrights.org
15%
20%
25%
30%
35%
40%
2011 Data Breaches by Type
30%
25%
24%
20%
20%
15%
16%
14%
14%
10%
9%
5%
2%
0%
Unintended
Disclosure
Hacking or
Malware
Payment Card
Fraud
Source: Privacy Rights Clearinghouse
A Chronology of Data Breaches
www.privacyrights.org
Insider
Physical Loss
Portable
Device
Stationary
Device
State Statutes
Currently, 47 other states have enacted some type of security breach notification
legislation, including:

Connecticut, Delaware, Florida, Georgia, Idaho, Illinois, Indiana, Maine,
Massachusetts, Minnesota, Montana, New Hampshire, New Jersey, New York,
North Carolina, Ohio, Oregon, Pennsylvania, Rhode Island, Texas, Vermont,
Washington and Wyoming.
Some states have state laws that require breaches to be reported to a centralized data base
including:

Maine, Maryland, New York, New Hampshire, North Carolina, Vermont and Virginia (Virginia’s
notification law only applies to electronic breaches affecting more than 1,000 residents).
Other states have some level of notification that has been made publicly available, primarily
through Freedom of Information requests including:

California, Colorado, Florida, Illinois, Massachusetts, Michigan, Nebraska, Hawaii and
Wisconsin. For details, see the Open Security Foundation Datalossdb website:
www.datalossdb.org
Massachusetts General Law 93H
Every person that owns, licenses, stores or maintains
personal information about a resident of the commonwealth
shall develop, implement, maintain and monitor a
comprehensive, written information security program
applicable to any records containing such personal
information.”
Massachusetts – Effective March 1, 2010
 Requires encryption of confidential data when it is on a mobile device
 Includes additional, robust security requirements for holders of
personal information of Massachusetts residents
Pennsylvania State Law 73 P.S. § 2303
Notification of a Breach
(a) General rule. – An entity that maintains, stores or manages computerized data that includes
personal information shall provide notice of any breach of the security of the system following discovery
of the breach of the security of the system to any resident of this Commonwealth whose unencrypted
and un-redacted personal information was or is reasonably believed to have been accessed and
acquired by an unauthorized person. Except as provided in section 4 [FN1] or in order to take any
measures necessary to determine the scope of the breach and to restore the reasonable integrity of the
data system, the notice shall be made without unreasonable delay. For the purpose of this section, a
resident of this Commonwealth may be determined to be an individual whose principal mailing address,
as reflected in the computerized data which is maintained, stored or managed by the entity, is in this
Commonwealth.
(b) Encrypted information. – An entity must provide notice of the breach if encrypted information is
accessed and acquired in an unencrypted form, if the security breach is linked to a breach of the
security of the encryption or if the security breach involves a person with access to the encryption key.
(c) Vendor notification. – A vendor that maintains, stores or manages computerized data on behalf of
another entity shall provide notice of any breach of the security system following discovery by the
vendor to the entity on whose behalf the vendor maintains, stores or manages the data. The entity shall
be responsible for making the determinations and discharging any remaining duties under this act.
Pennsylvania State Law 73 P.S. § 2305
Notification of Consumer Reporting Agencies
When an entity provides notification under this act to
more than 1,000 persons at one time, the entity shall
also notify, without unreasonable delay, all consumer
reporting agencies that compile and maintain files on
consumers on a nationwide basis, as defined in section
603 of the Fair Credit Reporting Act (Public Law 91-508,
15 U.S.C. § 1681a), of the timing, distribution and
number of notices.
Delaware Law § 12B-102
Notification of a Breach
(a) An individual or a commercial entity that conducts business in Delaware and that owns or licenses
computerized data that includes personal information about a resident of Delaware shall, when it
becomes aware of a breach of the security of the system, conduct in good faith a reasonable and
prompt investigation to determine the likelihood that personal information has been or will be misused.
If the investigation determines that the misuse of information about a Delaware resident has occurred
or is reasonably likely to occur, the individual or the commercial entity shall give notice as soon as
possible to the affected Delaware resident. Notice must be made in the most expedient time possible
and without unreasonable delay, consistent with the legitimate needs of law enforcement and
consistent with any measures necessary to determine the scope of the breach and to restore the
reasonable integrity of the computerized data system.
(b) An individual or a commercial entity that maintains computerized data that includes personal
information that the individual or the commercial entity does not own or license shall give notice to and
cooperate with the owner or licensee of the information of any breach of the security of the system
immediately following discovery of a breach, if misuse of personal information about a Delaware
resident occurred or is reasonably likely to occur. Cooperation includes sharing with the owner or
licensee information relevant to the breach.
(c) Notice required by this chapter may be delayed if a law enforcement agency determines that the
notice will impede a criminal investigation. Notice required by this chapter must be made in good faith,
without unreasonable delay and as soon as possible after the law enforcement agency determines that
notification will no longer impede the investigation.
Delaware Law § 12B-103
Compliance Procedures
(a)Under this chapter, an individual or a commercial entity that maintains its
own notice procedures as part of an information security policy for the
treatment of personal information, and whose procedures are otherwise
consistent with the timing requirements of this chapter is deemed to be in
compliance with the notice requirements of this chapter if the individual or
the commercial entity notifies affected Delaware residents in accordance with
its policies in the event of a breach of security of the system.
(b)Under this chapter, an individual or a commercial entity that is regulated
by state or federal law and that maintains procedures for a breach of the
security of the system pursuant to the laws, rules, regulations, guidances, or
guidelines established by its primary or functional state or federal regulator is
deemed to be in compliance with this chapter if the individual or the
commercial entity notifies affected Delaware residents in accordance with the
maintained procedures when a breach occurs.
The “Perfect Storm”
First Party
Loss of Private Data
• Notification Costs
• Publicity Costs
• Crisis Management Expenses
Business Continuity Expense
• Extra Expenses to continue
operations
• Business Income loss
Cyber Extortion
• Ransom Payment
• Other Expenses
Third Party
Client Suits - Privacy
• Suits from clients
alleging negligence in
protecting information
and other causes of
action
Client Suits – Denial of
Service
• Suits from clients
alleging negligence in
protecting the network
against denial of
service
Breach Related Expenses
Notification
Public Relations
Forensics
Legal
 Crafting letter or
other
notification
 Advertising &
Press Releases
 Legal Expenses for
Outside Attorney
 Response to
Claims or Suits
 Printing or design
 Call Center
Operations
 Cost of Forensic
Examination
 Mailing or other
transmission
 Other Services for
Effected Persons:
 Cost To Remediate
Discovered
Vulnerabilities
 Payment of
Judgments or
Settlements
 Credit
Monitoring
Trends in Data Breach Costs
In a U.S. based study of 49 companies in 14 different industries. Number of
breached records/incident ranged from 4,500 to 98,000.
•
•
•
•
•
•
The organizational cost has declined from $7.2M to $5.5M
Cost per record has declined from $214 to $194
Lost business due to a breach averages $3.01M
Detection and escalation costs declined from $460K to $433K
Cost to notify victims increased from $510K to $560K
First timers on average spent $37 more per record; Too-quick/nonplanners on average spent $33 more per record
• CISO can reduce cost per record by $80; Outside consultant can reduce
cost per record by $41.
2011 Ponemon Institute Benchmark Study
Cyber Risk Insurance Policies
Traditional Insurance Coverage?
ISO Commercial
Property?
Electronic Data Extension only
addresses loss or damage to data
which has been destroyed or
corrupted by a covered cause of loss.
Commercial Crime
Form?
No coverage due to the Definition of
“Other Property” and the Exclusion of
“Indirect Loss”.
General Liability Policy?
Addresses only physical injury to
persons or tangible property, as well as
the Insured’s publication of material
that violates a person’s right to privacy.
Professional Liability
Policy?
May be limited by the description of
“Professional Services” or by
Exclusions for “Invasion of Privacy”.
Common First Party “Gaps”
Cyber Vandalism
Denial of Service
ISO Property Policy
Surety Assoc. Computer
Crime
Cyber Extortion
Cyber Fraud
Unauthorized Record
Access
Surety Assoc. Crime
Policy
Extortion & Kidnap
Ransom Policy
Only Cyber Risk Covers:
• Notification Expenses
When required by law or on a voluntary basis?
• Credit Monitoring Expenses
For a stipulated period of time and/or under specified
circumstances?
• Crisis Management Expenses
Including expenses related to legal analysis, as well as
public relations?
What Information Assets Are Covered?
Personal Identifiable
Information (PII)
• Customers, Employees,
Others?
Personal Health Information
(PHI)
Business Property:
• Customer Lists (non-PII)
• Financial Information
• Marketing & Operational
Information
Trade Secrets
Privacy Risk
Cyber Policy Addresses
• Access to information other than
by over the Internet
• Access to information by an
employee
Employees
• Access to information residing on
an “outsourced” system –
anywhere
Outsourcers
• Access to information in “nonelectronic” form
• Negligent release of information
Conclusion
Avoid It
Assess &
Mitigate It
Employee Training
Operational
Guidelines
Customer
Awareness
Penetration Testing
Robust Patch
Management
Ongoing Security
Assessments
Insure It
Cyber Insurance
Policy
&
Crime Insurance
QUESTIONS???
Download