Download Presentation 2
Download
Report
Transcript Download Presentation 2
Cyber Insurance
The role of analytics in supporting the acceptance of cyber exposure
A presentation to C.A.S
By David Ovenden
Oct 2015
© 2015 Towers Watson. All rights reserved. Proprietary and Confidential. For Towers Watson and Towers Watson client use only.
Agenda
Introduction
Background
Coverage types
Actors
Vectors
Why is this a difficult class of business
The anatomy of a hack
How can analytics support
2
towerswatson.com
© 2015 Towers Watson. All rights reserved. Proprietary and Confidential. For Towers Watson and Towers Watson client use only.
Background
A few names that have had
security issues recently
Hacking is becoming an
increasingly mainstream
occurrence
The cost of data breaches is
escalating
The impact can be catastrophic
State actors are undoubtedly
involved
The subject matter is not well
understood within the insurance
industry
Our lives and business
interactions are digital
Insurance solutions lag behind
the issue
Source: Information is beautiful
3
towerswatson.com
© 2015 Towers Watson. All rights reserved. Proprietary and Confidential. For Towers Watson and Towers Watson client use only.
Some UK Government research
of large organisations
of large organisations
69%
90%
74%
38%
of small organisations
Had a security breach
Year on year increase
Were attacked by an unauthorised
outsider last year
Year on year increase
of large organisations
30%
of small organisations
of large organisations
39%
16%
of small organisations
Were hit by a DoS attacks in the last year
Year on year decrease
27%
of small organisations
Believe they have insurance that would
cover a breach
Year on year decrease
Source: UK Government Report on Information Security
4
towerswatson.com
© 2015 Towers Watson. All rights reserved. Proprietary and Confidential. For Towers Watson and Towers Watson client use only.
buster
thomas
tigger
Actors and Vectors
robert
soccer
batman
Vandals
Direct Hacks
test
pass
Thrill Seekers
Mass Attack
killer
hockey
Show offs
Infection / Virus
george
charlie
Thieves
DDOs
andrew
michelle
Social Engineering
love
Organised crime
Hacktivist
Inside jobs
jessica
Industrial espionage
Accidents
pepper
State craft
Poor practices
The unaware
Physical peril
sunshine
6969
daniel
access
123456789
654321
joshua
maggie
5
towerswatson.com
starwars
© 2015 Towers Watson. All rights reserved. Proprietary and Confidential. For Towers Watson and Towers Watson client use only.
silver
password
123456
12345678
Coverage types
Underlying
Exclusion
First Party
Specialist
Coverage
1234
qwerty
12345
dragon
Loss, damage or corruption of data
Business interruption following a loss
Costs, fines and penalties
Reconstruction of data
pussy
baseball
football
Comprehensive
Data exclusions
Most products
exclude “cyber
cat”
letmein
monkey
696969
Third Party
Professional indemnity
Libel
General liability
Breach of privacy
D&O
abc123
mustang
michael
shadow
master
jennifer
111111
2000
jordan
superman
harley
1234567
6
towerswatson.com
hunter
© 2015 Towers Watson. All rights reserved. Proprietary and Confidential. For Towers Watson and Towers Watson client use only.
trustno1
amanda
orange
biteme
Why is this so difficult?
freedom
computer
sexy
First Party
Third Party
Volume of activity
Understanding
Potential aggregations
Difficulty policing
Lack of knowledge
Poor history
thunder
nicole
ginger
heather
hammer
summer
corvette
taylor
austin
Difficult claims settlement
Limits required
1111
merlin
Lack of partnerships
environment
Limited pull or push
Limits required
Emerging legal
Lack of data
matthew
121212
golfer
cheese
princess
martin
Better opportunities?
chelsea
patrick
richard 7
towerswatson.com
© 2015 Towers Watson. All rights reserved. Proprietary and Confidential. For Towers Watson and Towers Watson client use only.
asdfgh
sparky
cowboy
Realistic analytical support
camaro
anthony
matrix
Understanding the data resources available
Setting the Data strategy
Pricing with limited data
Modelling appetite and disaster scenarios (EMLs)
falcon
iloveyou
bailey
guitar
jackson
purple
Underwriting
& Claims
Expertise
phoenix
aaaaaa
Catastrophe potential
morgan
tigers
Decision support
Portfolio management analytics
scooter
porsche
mickey
Analytical
Expertise
maverick
cookie
nascar
IT Security
Expertise
peanut
justin
131313
money8
towerswatson.com
© 2015 Towers Watson. All rights reserved. Proprietary and Confidential. For Towers Watson and Towers Watson client use only.
boomer
Building IP around Cyber within your organisation
Bring together a range of external data sources relevant for your target
segment, potentially including breach data segmented by:
Automation v Security Surveys
Underlying technology
Industry sector
Suppliers
Size / scale
Sensitivity of the data
Policy limits selected
Credit score
Cross reference physical security
Unless you have big data (unstructured data) expertise collect as much
objective structured data as possible from your IT partners
Work closely with your underwriters to ensure analytical rigour
If you have a portfolio of this risk, make sure it is actively managed
9
towerswatson.com
© 2015 Towers Watson. All rights reserved. Proprietary and Confidential. For Towers Watson and Towers Watson client use only.
An example commercial analytics environment
Integrated Commercial
data environment
Outcomes
Quote
engine(s)
Market data (CMA)
Policy MI
Performance data
Client data
Claims MI
Broker data
Interactive case level
decision support
UW and
Pricing
Analytics
Radar
Decision support
Industrialised technical reporting
Portfolio Analytics
External Financial Data
External Cyber data sources
Augmented
renewal lists
Interactive
Product
dashboard
Interactive
Regional
dashboard
Interactive
Broker
dashboard
10
towerswatson.com
© 2015 Towers Watson. All rights reserved. Proprietary and Confidential. For Towers Watson and Towers Watson client use only.
Questions?
11
towerswatson.com
© 2015 Towers Watson. All rights reserved. Proprietary and Confidential. For Towers Watson and Towers Watson client use only.