Presentation Title Here on Two Lines

Download Report

Transcript Presentation Title Here on Two Lines

The Time for Cyber Coverage is
Now
Your insureds and clients
Are Not Immune
October 8, 2014
Kevin Ribble
E.V.P. Edgewater Holdings
President, EPRMA.org
[email protected]
(214) 676-8662 (office)
(312) 431-1766 (fax)
Texas License # 1682508
Today’s Agenda

Introduction to Panel

Cyber Crime statistics

Why are mid-market accounts considered to Be at High-Risk?

Types of Threats

What is the potential harm to your insureds and client’s businesses?

Overview of Data Breaches

Overview of a cyber-attach

Case Studies

Risk Transfer & Risk Management

Cyber coverages recommended & broker coverage check list

Summary

Q&A
Cyber Crime Statistics
Data Under Siege
Global Cyber Event Heat Map
Cyber Event Type Composition by
Year
Cyber Events by Company Size
Number of
Employees
0 - 25
25 - 50
50 - 100
100 - 250
250 - 500
500 - 1,000
1,000 - 5,000
5,000 - 10,000
10,000+
Total
Event
Count
1,626
571
570
761
515
544
1,427
638
3,595
10,247
Percenta
ge
15.9%
5.6%
5.6%
7.5%
5.0%
5.3%
13.9%
6.2%
35.1%
100.0%
Cyber Litigation Frequency Index
700
600
Improper Collection
of Digital Data
500
400
Privacy Violations
300
200
Improper
Disposal/Distribution
Loss or Theft
(Printed Records)
100
0
2005
2006
2007
2008
2009
2010
2011
2012
2013
All
Privacy Violations
System/Network Security Violation or Disruption
Digital Data Breach, Loss, or Theft
Improper Disposal/Distribution, Loss or Theft (Printed Records)
Improper Collection of Digital Data
Data Under Siege:
Malicious Threats


Hackers, extortionists, disgruntled employees, fraudsters
Malware, spyware, spam,
Malware, short for malicious (or malevolent) software, is software used or programmed by
attackers to disrupt computer operation, gather sensitive information, or gain access to private
computer systems. It can appear in the form of code, scripts, active content, and other
software.[1] 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive
software.[2]
Malware includes computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers,
dialers, spyware, adware, malicious BHOs, rogue security software and other malicious
programs; the majority of active malware threats are usually worms or trojans rather than
viruses.[

Phishing, pharming

A: Both pharming and phishing are methods used to steal personal information from
unsuspecting people over the Internet.
Phishing typically involves fraudulent bulk e-mail messages that guide recipients to legitimatelooking but fake Web sites and try to get them to supply personal information like account
passwords.
Pharming tampers with the domain-name server system so that traffic to a Web site is secretly
redirected to a different site altogether, even though the browser seems to be displaying the
Web address you wanted to visit.
Data Under Siege
1992 – 2007, 2M unique malicious programs
2007 – 2009, 33.9M unique malicious programs
2010 hit new record 1.5 Billion (ump)
31% of IT specialist were unaware of most deadly
(ump)
87%, of system vulnerabilities were due to 3rd
party applications, Microsoft, Java, IT
infrastructure
“U.S. Code Cracking Agency Works as if Compromised” – Reuters News 12 16 2010
Global IT Security Risks Report, Kaspersky Lab 2012
Cyber Crime and Small Businesses
 ATM skimming generates losses of $50 million
each year1
 One in 20 adults is at risk of identity theft
 One in 465 is a victim of identity theft
 Average cost per compromised document: $214
• Not including civil damages and/or defense costs)
1 Electronic
Funds Transfer Agency
www.efta.org
Why are Small & Mid-market Businesses
considered to be at High Risk?
Cyber Crime and Small Businesses
 Over 20% of small businesses have suffered a data
breach1
 Number of attacks on rise, breach size declining, indicating
cybercriminals go after smaller targets e.g. small
enterprises (less security = easier attacks)
 Malicious attacks (hacking or inside theft) constitute 40% of
recorded breaches in 2011
 Visa reports 80% all card breaches arise from Level 4
merchants (those with fewer than 50 employees)
 Each year, more than 10 million individual identity thefts
1 Poneman
Institute Study on Cyber Crime
Small Business Data Theft Risk Management Study
Threats: Not “If” but “When”
Non-Malicious Threats
 Employee mistakes: Lost / stolen laptops and
portable devices
 Application glitches
 Network operation and “sharing” trends
 Points of failure are now multiplied due to
outsourcing
 Dependencies & data-sharing between biz
partners including cloud servers
 Upstream & down stream vendors (ASPS,
partners, ISPs)
Methods of Fraud
What Are Thieves Looking For?
PII & Cardholder Data
Social security numbers, names and addresses
 Health insurance applications
• Primary Account Number (PAN)
• CID number (this must never be stored)
• Sensitive authentication data = card use and cardholder’s
identity
Methods Include
• Compromised card readers
• Papers stored in unlocked filing cabinets
• Data held in a payment system database
• Hidden camera recordings entry of authentication data
• Secret “tap” on your company’s wired or wifi network
The Risk to Your Insureds
Disgruntled employees – non-disclosure
Loss of revenue, System crashes from hackers
Data Breach: Auto customer data, patient PII,
Your e-mail infects customers
Businesses utilize social media, e-marketing materials,
company blogs
Lack of knowledge & resources to respond to breach,
timely
The High Risk to Small and Mid-size
Accounts
(under 50 employees & < 10MM Gross Revenue)
Why are Small & Mid-market Businesses considered to be at
High Risk?
Hackers and thieves are targeting Small Businesses,
because:
• Small businesses typically lack the resources and expertise to
successfully fend-off – or even respond to – attacks
• Lack of a formal IT department means that Payment Card
Industry (PCI) Data Security compliance is particularly
challenging for small organizations

The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements designed to ensure that ALL
companies that process, store or transmit credit card information maintain a secure environment.
An attack or error of negligence could prove catastrophic for
the typical small business
“Over 20% of small businesses had already suffered a data breach…. small businesses do not have
adequate measures or remedies in place to protect themselves.”
- Larry Ponemon
Ponemon Institute
Small Business Data Theft Risk Management Study
Potential for Business Harm to Your Insured’s
Enterprise
What is the potential harm to your client’s enterprise?
Business fall-out can be severe (including negligence and breach)
Agency E&O / D&O
•
Failing to meet Payment Card Industry (PCI) rules or negligently managing PII
data
 State statutory notification, fines and penalties
 Fines and Penalties (liquidated damages)
 Termination of ability to accept payment cards
 Reduction in business, lost customers (20% likely)
 Cost of reissuing payment cards ($100 per card VISA)
 Fraud losses (see civil damages)
 Legal costs, settlements, and judgments
 Increase in compliance costs
 Going out of business (i.e., breach exceeds net worth of company)
Joseph F. Bermudez, Esq.
Scott D. Sweeney, Esq.
Wilson Elser, LLP
October 8, 2014
Cyber Breaches and Liability
18
© 2014 Wilson Elser. All rights reserved.
Overview
•
•
•
•
Data Breach Overview
Data Breaches in the News
Life Cycle of a Breach
Are you Ready?
19
© 2013 Wilson Elser. All rights reserved.
Data Breach Overview
•
•
•
•
How do breaches occur?
Costs of a data breach
Legal liability for breaches
Data breach response and mitigation
20
© 2014 Wilson Elser. All rights reserved.
Data Breaches
Who Are the Victims?
•
•
•
•
•
•
Financial institutions
Retail and restaurant industries
Manufacturing, transportation, utilities
IT and professional services firms
Health Care organizations
Impact on larger organizations
21
© 2014 Wilson Elser. All rights reserved.
Data Breaches
Who Is Perpetrating Breaches?
•
•
•
•
•
Outsiders of the organization
Insiders of the organization
Business partners
Multiple parties
State (government) affiliated actors
22
© 2014 Wilson Elser. All rights reserved.
Data Breaches
How Do Breaches Occur?
•
•
•
•
•
•
•
•
Hacking
Insider wrongdoing
Human error
Network intrusion exploiting stolen credentials
Use of malware
Physical attacks
Leveraged social tactics such as phishing
Privilege misuse and abuse, including theft of IP
and corporate espionage
23
© 2014 Wilson Elser. All rights reserved.
Data Breach Response Costs
•
•
•
•
•
•
Avg. total organizational cost of breach ($5.8M)
Avg. detection costs ($417,700)
Avg. notification costs ($509,237)
Avg. remediation costs ($1,599,996)
Avg. lost business costs ($3,324,959)
$201 a record
Note: Figures do not include mega breaches in excess of
100,000 breached records
Source: Ponemon Institute 2014 Cost of Data Breach Study
24
© 2014 Wilson Elser. All rights reserved.
Other Breach Related Costs
• Litigation costs
– Consumer class actions
– Shareholder suits
– Government investigations and proceedings
• Impact on corporate finances
–
–
–
–
Cash flow
Loan covenants and credit
Shareholder value
Reputational injury and loss of business
25
© 2014 Wilson Elser. All rights reserved.
Data Breaches in the News
26
© 2014 Wilson Elser. All rights reserved.
Target Data Breach Overview
• Hackers used stolen credentials from a third
party vendor
• Inserted malware into the company’s
computerized payment systems
• Malware scraped credit card data
• Data breach compromised 40 million credit and
debt accounts
• Personal data of 110 million customers was
compromised
27
© 2014 Wilson Elser. All rights reserved.
Company’s Public Disclosures
12/19/13
• Company announced that hackers gained
unauthorized access to payment card data
• Affected credit and debit card transactions in
U.S. stores from 11/27/13 to 12/15/13
• Internal investigation of the data breach
• Retention of outside forensics firm
• Company also alerted authorities and financial
institutions
28
© 2014 Wilson Elser. All rights reserved.
Company’s Public Disclosures
1/13/14
•
•
•
•
CEO and Chairman apologized to customers
Provided status update on internal investigation
Malware removed
Company hired data security experts to investigate
causes of the breach
• Company was working with law enforcement
• Assured customers they would have “zero liability” for
fraudulent charges
• One year of free credit monitoring services
29
© 2014 Wilson Elser. All rights reserved.
Impact on Company’s Financials
• 5.5% decrease in sales in 4Q 2013
• “Meaningfully softer results” following news of
the breach
• 11% drop in stock price
• Reputational injury
30
© 2014 Wilson Elser. All rights reserved.
Data Breach Response Costs
• $61 million incurred in 4Q 2013 for data breach
response costs
• Amounts include
– internal investigation costs
– credit monitoring
– staffing call centers
• Company’s insurers agreed to pay $44 million
• Company will continue to incur breach related
costs for the foreseeable future
31
© 2014 Wilson Elser. All rights reserved.
Data Breach Lawsuits
•
•
•
•
•
80 civil lawsuits filed against company
Suits by customers
Suits by payment card issuing banks
Shareholder litigation against D&Os
Government investigations
– Federal Trade Commission
– SEC and DOJ
– 30 State Attorney Generals
32
© 2014 Wilson Elser. All rights reserved.
CFO Testifies Before U.S. Senate
• 2/4/14 – Company’s CFO testified before senate
committee
• On 12/12/13, DOJ alerted Company to “suspicious
activity”
• Internal investigation confirmed installation of malware
and potential theft of credit card data
• Company invested $5 million in a public education
campaign regarding cybersecurity
• Company launched a retail industry Cybersecurity and
Data Privacy Initiative
33
© 2014 Wilson Elser. All rights reserved.
Other Recent Data Breaches
•
•
•
•
•
•
•
•
•
Home Depot
Neiman Marcus
Advocate Healthcare
Twitter
Adobe
Facebook
Living Social
Evernote
Federal Reserve Bank
34
© 2014 Wilson Elser. All rights reserved.
Life Cycle of a Breach
• Triggering the Incident Response Team
• Making sure the right people / partners are part of the team
• Containment
• Have you stopped the “bleeding”?
• Remediation
• Have you taken steps to prevent this type of event from
occurring in the future?
• Identification of the Threat or Security Incident
• What just happened?
Notification – and beyond
Overview
You are part of a company that
operates retail stores throughout
the United States. Payment-card
and HR processing is handled by
your corporate offices for all
stores. The Company employees
approximately 20,000 employees.
Cyber Attack!
ATTACK!
What Just Happened?
•Your Company was the victim of a sql injection attack
against a web application that provided information on
customers who had purchased the Company’s
services. The hacker appears to have gained access t
o a database that was serving the web application.
•Question: What Do You Do?
Information Exposed
oThe initial investigation shows that the database contained
employees’ names, addresses, social security numbers,
driver’s license numbers, position, and bank account
information. The database has been operational for 5
years. The database appears to have stored cardholder
information for repeat customers.
oQuestion: Now what? Does this impact your initial plan of
action?
Monkey Wrench #1
You just learned that Brian Krebs, an online reporter who is
credited with breaking the story that Target had been breached,
and is followed by thousands of other publications, posted a story
on his blog that the Company appears to have been breached.
The story mentions that the Company failed to return phone calls
for two days.
Monkey Wrench #2
The CEO of the Company contacts you, and tells you that he just
received an e-mail from an unknown e-mail address, informing him
that this person has the personal information of the CEO and his
daughter, provides his driver’s license as proof, and threatens to
post it online unless the CEO pays a ransom.
Update From Investigation
The database contained a link to an application that was connected to
the Company’s payment processing system, which is centrally located at
the Company’s headquarters. The application automatically updated
information for repeat customers, but also allowed the hacker to
potentially access the payment card information of all customers,
exposing over 2 million credit cards.
Monkey Wrench #3
The FBI has just showed up at your door, and wants access to
your data center so it can image your computers and servers in
order to investigate the cyber attack.
Money Wrench #4
In the midst of your investigation, you receive an Inquiry from
regulatory agency requesting more information about the event,
asking for policies and procedures, and seeking a meeting.
Summary
Responding Quickly, But Effectively Matters
Know Who Your “Team” Members Are Before You Have An Event Internal And External
Training And Education Matters!
No Two Events Are Alike - Expect The Unexpected
Cyber Stress Test
Are you Prepared?
How many of the following does your company
have?
1.
Do you process or store credit cards for payments?
2.
Have you had a PCI compliance audit conducted or have you had any external assessment to
confirm you are compliant with the PCI standards?
3.
Do you store any of the following information about your customers or employees: social security
number, name and address, credit card or bank details?
4.
Do you maintain an active presence on any major social media sites (e.g.? Facebook, Twitter,
YouTube, Trip Advisor, etc.)?
5.
Do you store any business critical data or information on your systems (e.g. financial / accounting
records, client lists, claim data, etc.?)
6.
Do you use a voice over IP telephony system (VoIP)?
7.
Do you have any individuals within the business that can authorize online payments of more than
$5,000?
8.
Do you rely on any technology systems in order to collect payments from customers?
9.
Do you encrypt all data delivered to credit card vendor?
10. Do you rely on any third party systems in order to secure bookings
Mid-Markeet Business Owners Cyber Stress
Test
How many of the following does your company have?
Do you process or store credit cards for payments?
This function captures PII and exposes to hacking PII = contract damages ($100 per replaced
card) ($214 credit monitoring etc. per customer)
Have you had a PCI compliance audit conducted or have you had any external assessment to confirm
you are compliant with the PCI standards?
This is the legal test to legal liability if hacked. The vendor can hold credit equal to the potential
legal exposure and hold until issue resolved, includes charges for replacement of credit card
Do you store any of the following information about your customers or employees: social security
number, name and address, credit card or bank details?
HIPPA exposure – hurricane
Do you maintain an active presence on any major social media sites (e.g? Facebook, Twitter,
YouTube, Trip Advisor, etc.)?
Copyright Violations, Reputation damages – not covered by GL
Stress Test continued
Do you store any business critical data or information on your systems (e.g. financial / accounting
records, customer lists, customer reservations, etc?)
Release of business personal information without consent and PII
Do you use a voice over IP telephony system (VoIP)?
Easy access point for hackers, increase exposure to privacy violations
Do you have any individuals within the business that can authorize online payments of more than
$5,000?
Security control requirements are much greater if this is in practice
Do you rely on any technology systems in order to collect payments from customers?
Another method for hackers to access PII exposing owner to breach and contract damages
9. Do you encrypt all data delivered to credit card vendor?
This is an automatic violation of PCI standards and most state codes
10. Do you rely on any third party systems in order to secure bookings (e.g. Open Table?)
Up-stream data retention facilities / clouds, if breached by your stored data can infect others data
= legal exposure to large number of PII that are not your clients.
Best Solution
Risk Transfer &
Risk Management
How to Protect Your
Company’s Data
Comply with the golden 12 Rules
Goal
Rule
Build and Maintain a Secure
Network
 Install and maintain a firewall configuration to protect data
 Do not use vendor-supplied defaults for system passwords and other security
parameters
Protect Cardholder and
HIPPA Data
 Protect stored data
 Encrypt transmission of cardholder data and sensitive information across
public networks
Maintain a Vulnerability
Management Program
 Use and regularly update anti-virus software
Implement Strong Access
Control Measures
 Restrict access to data by business need-to-know
 Develop and maintain secure systems and applications
 Assign a unique ID to each person with computer access
 Restrict physical access to cardholder data
Regularly Monitor and Test
Networks
 Track and monitor all access to network resources and cardholder data
Maintain an Information
Security Policy
 Maintain – and update – a policy that addresses information security
 Regularly test security systems and processes
How to Protect Your
Company’s Data
Comply with the golden 12 Rules
Goal
Rule
Build and Maintain a
Secure Network
 Install and maintain a firewall configuration to protect
Protect Cardholder
and HIPPA Data
 Protect stored data
data
 Do not use vendor-supplied defaults for system
passwords and other security parameters
 Encrypt transmission of cardholder data and sensitive
information across public networks
Maintain a
Vulnerability
Management
Program
 Use and regularly update anti-virus software
Implement Strong
Access Control
Measures
 Restrict access to data by business need-to-know
Regularly Monitor
and Test Networks
 Track and monitor all access to network resources and
Maintain an
 Maintain – and update – a policy that addresses
 Develop and maintain secure systems and applications
 Assign a unique ID to each person with computer access
 Restrict physical access to cardholder data
cardholder data
 Regularly test security systems and processes
Recommended Cyber Coverage
What does System Damage &
Interruption cover?
This is first party cover that protects companies against their own losses resulting from damage to
data caused either deliberately by a malicious employee or hacker, or totally accidentally (the
infamous “fat finger”). The system interruption cover stems directly from this but is restricted to
malicious employees, hackers or computer viruses. This provides protection against loss of profits
arising directly from these perils.
What does Cyber & Privacy
Liability cover? (includes PCI
fines and penalties)
This provides liability coverage – including legal defense costs and indemnity payments – for claims
brought against you arising from a data security breach, whether through electronic means or
otherwise. This is provided on an “all risks basis”. The coverage is also extended to include liability
protection against claims arising from you spreading a computer virus or from your systems being
used to hack a third party.
What does Breach Response
cover?
This provides first party cover for the cost of complying with breach notification laws. Coverage is
also included for voluntary security breach notification, where this helps to mitigate adverse impact
upon the company’s brand or reputation. The coverage itself will pay for the legal costs of drafting a
breach letter, the cost of printing and posting the letter, credit monitoring costs, and forensic costs
that may be required to identify the extent of the breach.
What does Media Liability
cover? (limited to web site
unless add endorsement) PL
& GL duplicate cover
This provides comprehensive liability coverage including legal defense costs as well as indemnity for
damages and fines (where insurable). Essentially, this coverage protects against claims for intellectual
property rights infringement (excluding patent) and defamation arising from content published by
the company or on its behalf. This coverage also extends to social media and user generated content,
including company and employee blogs.
What does regulatory
privacy cover?
This provides coverage for the costs associated with defending yourself against a regulatory action
brought against you as a direct result of a privacy breach. This includes actions brought by federal
regulators such as the FTC and similar state or industry bodies. Coverage is also extended to include
fines and penalties that are issued as a result, where these are insurable by law.
Recommended Cyber Coverage Limits
System Damage & Interruption - (minimum $250k)
Regulatory Fines & Penalties – $1M limits
Privacy Breach Notification – $250k / $1M limits
Media Liability - $1M limits
PCI Fines & Penalties – $250k, $1M limit
Policy Review Questions
First & Third-Party Liability
Coverage for transmission of virus to third party and 3rd party to others
Copyright infringement from website
Forensic investigation covered as part of breach notification?
Coverage applies to both electronic and physical data breaches e.g. paper,
laptop, disks, PDA etc. ?
Coverage applies to both personal and company information? (IFI 1st Co)
Coverage applies to employee and customer information
Information in care custody or control of insured’s vendors include cloud
servers and paper records being transported?
Policy apply to accidental losses and leaks?
Does application require PCI compliance or encryption?
No insider exclusion?
Direct intentional attacks are covered is “wild viruses” those not specifically
targeting insured?
Liquidated damages and fines and penalties? Know position, provable court
Policy Review Questions
Media liability
Media Liability is valid anywhere in world?
Coverage extend to include social networking , emails, twitter? (PL & GL)
Coverage apply to user-generated content (opinion boards for feedback)
Extortion – no limit to threat method
Breach Response – Crisis Management
Policy apply to attorney fees to draft response to breach and related deliver costs?
Is credit monitoring included for individuals? (employees? )
Will policy provide options to notification methods?
Coverage include forensic investigation?
First Party business interruption
Forensic Investigation covered?
Do they offer contingent period after system restored?
Based on time system is down or a stated time period?
Wild & targeted viruses included ?
Loss of Reputation ?
Summary
Questions?
58
© 2014 Wilson Elser. All rights reserved.
Contact
Melissa Ventrone
Wilson Elser LLP (Chicago)
Phone: 312-821-6105
Email: [email protected]
Joseph F. Bermudez, Scott D. Sweeney
Wilson Elser LLP (Denver)
Phone: 303-572-5310; 303-572-5324
Email: [email protected]
[email protected]
59
© 2014 Wilson Elser. All rights reserved.
Questions?