SlideShare a Scribd company logo
1 of 12
BIG DATA BIGGER RISKS
Increased use of electronic data - Smart phones,
laptops, credit cards
Cloud Computing - Concentration of large
amounts of data in one place
Stringent laws related to data breach –
Section 43 A IT ACT (India), Sectorial laws
regulation by SEBI and RBI (India ), The Financial
Services Modernization Act (U.S.) HIPAA (U.S.),
EU directives
Too Big to fail ……?– No. of records
compromised
1.Ebay – 145 Mn
2.Target – 70 Mn
3.Adobe – 152 mn
4.Sony PS– 77 Mn
5.Yahoo Japan – 22 Mn
WHAT TRIGGERS A BREACH ? • BP employee loses laptop containing data
on 13,000 oil spill claimants.
•Malware installed in Target’s payment
system. 40 MN credit card numbers compromised.
•A phishing email disguised as originating from the
RBI, promised its recipient prize money of Rs.10 Lakh
within 48 hours, by giving a link which leads the user
to a website that resembles the official website of RB
with the similar logo and web address.
Source: Ponemon Institute© Research Report
2013
Growth of data breach
• 253 network breaches in 2013 as against 208 in
2011
• Eight breaches in 2013 exposed more than 10
MN identities as against 5 in 2011
• In total 552 Mn identities were breached in
2013
It is no longer an IT issue but an active
business risk
VICTIM COSTS
Notification
Call Center
Identity Monitoring (credit/non-credit)
Identity Restoration
DIRECT COSTS
Discovery/Data Forensics
Loss of Employee Productivity
INDIRECT COSTS
Restitution
Additional Security and Audit Requirements
Lawsuits
Regulatory Fines
OPPORTUNITY COSTS
Loss of Consumer Confidence
Loss of Funding
$14.00
$10.00
$40.00
$140.00
Cost per record:
$204
© Ponemon Institute
Real life incidents
1. Commercial bank (over $5B in revenues, over
$200B in assets)
Lockbox containing backup tapes were lost in transit with
tens of millions of personal data
Over $10MM in crisis management has been paid to
date
Consumer class action suit has been brought
2. Online retailer (over $5B in revenues)
Hacker accessed a server and obtained personal
information of over 17 million customers
Posted 2,000 records on a blog as proof and demanded
over $1MM to not release the data
To date over $1.5MM spend on Crisis Management
expenses including notification and forensics
Two class actions have been filed
3. Internet services company (about $1.5B in
revenues)
Unauthorized access led to viewing and
downloading of personal information
Multiple class actions have been filed
Over $200,000 to date in defense
4. Credit card processor (over $1.5B in
revenues)
Employees allegedly accessed customer
information of a client to make fraudulent
transactions
CYBER CRIME INSURANCE VS
OTHER LIABILITY POLICIES
Let’s look at some policies which are usually
bought to manage business exposures.
I.Errors and Omission
II.Commercial General Liability
III.Crime Insurance
Coverages PI/CGL/Crime
insurances
Breach response costs No
Legal liability to others for
loss of data
Partial
Intellectual property
infringement
Partial
Loss of revenue due to
network breach
No
Regulatory investigations
and civil fines and penalties
No
Cyber Extortion No
HOW THE CYBER POLICY
OPERATES ?
Breach response costs
Proactive forensic services, credit monitoring
and cost of recreating data
Crisis Management Expense
Business interruption losses due to breach
Ransom and security consultant costs
Legal fees in connection with investigation
Fines resulting from regulatory investigation
 Liability of Loss of confidential information
of individuals as well as corporates
 Failure of network and information
security to prevent the transmission of
computer viruses or the penetration of a
hacker
 Infringement of a copyright by your
website content
Professional Indemnity Insurance
HOW THE CYBER POLICY
OPERATES ?
Breach response costs
Proactive forensic services, credit monitoring
and cost of recreating data
Crisis Management Expense
Business interruption losses due to breach
Ransom and security consultant costs
Notification costs
Fines resulting from regulator
FIRST PARTY THIRD PARTY
WHO ARE THE VICTIMS?
Businesses should buy Cyber insurance if
Their business activity is dependent upon IT
systems
Confidential data is handled in the course of
business
They have significant online presence and
operations
They process electronic payments
Are required to do so contractually
HOW CAN PRUDENT ASSIST ?
Prudent has a specialist team of risk advisors including
6 dedicated liability lines professionals and 3 lawyers
as full time employees
We can help you in
Arranging a review of the your IT systems through
security experts
Identifying gaps in your current insurances
Designing a customized coverage solution for your
cyber insurance needs
Arranging the most cost effective cover from
insurance and reinsurance markets
Ensuring contract compliance from an insurance
perspective
Assisting you with the claims management in case of
such an even
Insurance
Retention
Ajit Singh Dhingra Managing Director
Ajit@PrudentBrokers.com
 
Pavanjit Singh Dhingra Chief Executive Officer
Pavan.Dhingra@PrudentBrokers.com
Alda Dhingra Vice President - International Businesses
AldaDhingra@PrudentBrokers.com
Vijay Rampal Senior Vice President & Principal Officer
Vijay.Rampal@PrudentBrokers.com
Sanjay Vig Vice President - Liability & Specialty Lines
Sanjay.Vig@PrudentBrokers.com
Vikas Singh Vice President - Reinsurance
Vikas.Singh@PrudentBrokers.com
Mandar Dalvi Vice President - Reinsurance, Structured Products & Advisory
Mandar.Dalvi@PrudentBrokers.com
H V Karkare Vice President - Reinsurance
HV.Karkare@PrudentBrokers.com
Tanuj Gulani Vice President - Specialty Lines
Tanuj.Gulani@PrudentBrokers.com
Mumbai
101, Tower B
Peninsula Business Park
Lower Parel
Mumbai 400 013
Tel: +91 22 3306 6000
Fax: +91 22 3306 6088
Delhi NCR
Plot No. 462,
Udyog Vihar, Phase V
Gurgaon
Haryana 122 016
Tel: +91 124 3999 000
Fax: +91 124 3999 010
Bangalore
Floor III, Sai Shakti
2207 Hal Stage III,
80 Feet Road, Kodihalli
Bangalore 560 008
Tel: +91 80 3024 2000
Fax: +91 80 3024 2060
Chennai
Flat 1, 5th Floor, Gokul Tower,
Plot # 7,
CP Ramaswamy Road
Alwarpet, Chennai 600 018
Tel: +91 44 3021 8700
Fax: +91 22 4265 8281
Pune
2nd Floor, “Adhisthan”
CTS No.2134, Vijaynagar Colony,
Sadashiv Peth,
Pune-411030
Tel: +91 20 6560 2744
Fax: +91 20 2546 3338
Hyderabad
D No-6-3-1093, Space No-606
6th Floor, VV Vintage Boulevard
Raj Bhawan Road
Somajiguda
Hyderabad 500 082
Tel: +91 40 4003 8054
Registered Office:
217 Prabhadevi Estate, V S Marg, Mumbai - 400 025
Composite Broker License No. 291 | CIN No. U70100MH1982PTC027681
Copyright © 2014 Prudent Insurance Brokers Private Limited. All rights reserved.
www.prudentbrokers.com
Delhi NCR
Eco Towers,
8th Floor, Plot No. 14,
Sector 125,
Noida 201 301

More Related Content

What's hot

Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E CommerceEamonnORagh
 
Internet threats and its effect on E-commerce
Internet threats and its effect on E-commerceInternet threats and its effect on E-commerce
Internet threats and its effect on E-commerceVipin Subhash
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule GeneralTeo Leonard
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?tommy2tone44
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
 
SSO - single sign on solution for banks and financial organizations
SSO - single sign on solution for banks and financial organizationsSSO - single sign on solution for banks and financial organizations
SSO - single sign on solution for banks and financial organizationsMohammad Shahnewaz
 
Relationship between data protection and m&a (1)
Relationship between data protection and m&a (1)Relationship between data protection and m&a (1)
Relationship between data protection and m&a (1)Ashish vishal
 
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Dr. Amarjeet Singh
 
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
 Business Fraud and Cybersecurity Best Practices in the Office or While Worki... Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...ArielMcCurdy
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jacksonaiimnevada
 
Noctress Presentation
Noctress PresentationNoctress Presentation
Noctress Presentationnoctress
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Jim Brashear
 

What's hot (20)

Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
Internet threats and its effect on E-commerce
Internet threats and its effect on E-commerceInternet threats and its effect on E-commerce
Internet threats and its effect on E-commerce
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule General
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?
 
E - comerce
E - comerceE - comerce
E - comerce
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
Analysis the attack and E-commerce security
Analysis the attack and E-commerce securityAnalysis the attack and E-commerce security
Analysis the attack and E-commerce security
 
SSO - single sign on solution for banks and financial organizations
SSO - single sign on solution for banks and financial organizationsSSO - single sign on solution for banks and financial organizations
SSO - single sign on solution for banks and financial organizations
 
Relationship between data protection and m&a (1)
Relationship between data protection and m&a (1)Relationship between data protection and m&a (1)
Relationship between data protection and m&a (1)
 
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
 
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
 Business Fraud and Cybersecurity Best Practices in the Office or While Worki... Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
 
Cybercrime issue
Cybercrime issueCybercrime issue
Cybercrime issue
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Data security
Data securityData security
Data security
 
Noctress Presentation
Noctress PresentationNoctress Presentation
Noctress Presentation
 
Cyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation GianinoCyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation Gianino
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
 

Viewers also liked

XSS Shell by Vandan Joshi
XSS Shell by Vandan JoshiXSS Shell by Vandan Joshi
XSS Shell by Vandan JoshiClubHack
 
Fatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep KambleFatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep KambleClubHack
 
Better Decision-Making with Power BI
Better Decision-Making with Power BIBetter Decision-Making with Power BI
Better Decision-Making with Power BIAptera Inc
 
MindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insuranceMindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insurancemindleaftechnologies
 
Youblisher.com 1201680-terra cia-edi_o_198
Youblisher.com 1201680-terra cia-edi_o_198Youblisher.com 1201680-terra cia-edi_o_198
Youblisher.com 1201680-terra cia-edi_o_198Lela Gomes
 
Online Reputation Mgt
Online Reputation MgtOnline Reputation Mgt
Online Reputation MgtThomas Dock
 
Khagen Consulting -
Khagen Consulting - Khagen Consulting -
Khagen Consulting - Ngwebifor
 
First Resort Group FZ LLC - Company Profile - IRAN Linked In
First Resort Group FZ LLC - Company Profile - IRAN Linked InFirst Resort Group FZ LLC - Company Profile - IRAN Linked In
First Resort Group FZ LLC - Company Profile - IRAN Linked InVictoria Cruickshank
 
Fiebre Verde Extra Verde
Fiebre Verde Extra VerdeFiebre Verde Extra Verde
Fiebre Verde Extra VerdeGAlleHAs
 
ECONOMÍA DE LA UNIÓN EUROPEA
ECONOMÍA DE LA UNIÓN EUROPEAECONOMÍA DE LA UNIÓN EUROPEA
ECONOMÍA DE LA UNIÓN EUROPEADune Arguijo Diaz
 
Z3950 Protocolo Tesis
Z3950 Protocolo TesisZ3950 Protocolo Tesis
Z3950 Protocolo TesisCristian Paul
 
Hp kurs information
Hp kurs informationHp kurs information
Hp kurs informationisch
 
Social Point
Social PointSocial Point
Social Pointbetabeers
 
Recambios Y Opciones InformáTicas 01 Es
Recambios Y Opciones InformáTicas 01 EsRecambios Y Opciones InformáTicas 01 Es
Recambios Y Opciones InformáTicas 01 EsJordi Dols
 

Viewers also liked (20)

XSS Shell by Vandan Joshi
XSS Shell by Vandan JoshiXSS Shell by Vandan Joshi
XSS Shell by Vandan Joshi
 
Fatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep KambleFatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep Kamble
 
Better Decision-Making with Power BI
Better Decision-Making with Power BIBetter Decision-Making with Power BI
Better Decision-Making with Power BI
 
MindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insuranceMindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insurance
 
La Bonne Etoile
La Bonne EtoileLa Bonne Etoile
La Bonne Etoile
 
OmParkash
OmParkashOmParkash
OmParkash
 
Youblisher.com 1201680-terra cia-edi_o_198
Youblisher.com 1201680-terra cia-edi_o_198Youblisher.com 1201680-terra cia-edi_o_198
Youblisher.com 1201680-terra cia-edi_o_198
 
AppDev-Booklet-Email
AppDev-Booklet-EmailAppDev-Booklet-Email
AppDev-Booklet-Email
 
Online Reputation Mgt
Online Reputation MgtOnline Reputation Mgt
Online Reputation Mgt
 
Khagen Consulting -
Khagen Consulting - Khagen Consulting -
Khagen Consulting -
 
First Resort Group FZ LLC - Company Profile - IRAN Linked In
First Resort Group FZ LLC - Company Profile - IRAN Linked InFirst Resort Group FZ LLC - Company Profile - IRAN Linked In
First Resort Group FZ LLC - Company Profile - IRAN Linked In
 
11 05-11
11 05-1111 05-11
11 05-11
 
Fiebre Verde Extra Verde
Fiebre Verde Extra VerdeFiebre Verde Extra Verde
Fiebre Verde Extra Verde
 
ECONOMÍA DE LA UNIÓN EUROPEA
ECONOMÍA DE LA UNIÓN EUROPEAECONOMÍA DE LA UNIÓN EUROPEA
ECONOMÍA DE LA UNIÓN EUROPEA
 
SikaProof- A
SikaProof- ASikaProof- A
SikaProof- A
 
Z3950 Protocolo Tesis
Z3950 Protocolo TesisZ3950 Protocolo Tesis
Z3950 Protocolo Tesis
 
Hp kurs information
Hp kurs informationHp kurs information
Hp kurs information
 
Social Point
Social PointSocial Point
Social Point
 
Hojadescuentocomercios2
Hojadescuentocomercios2Hojadescuentocomercios2
Hojadescuentocomercios2
 
Recambios Y Opciones InformáTicas 01 Es
Recambios Y Opciones InformáTicas 01 EsRecambios Y Opciones InformáTicas 01 Es
Recambios Y Opciones InformáTicas 01 Es
 

Similar to Cyber Insurance

What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Vijay Dalmia
 
IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the HourVijay Dalmia
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers BDO_Consulting
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgeAgile Financial Technologies
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementseadeloitte
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustGrant Thornton LLP
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataSteven Schwartz
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1NetWatcher
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A ReviewIRJET Journal
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Don Grauel
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityJoan Weber
 

Similar to Cyber Insurance (20)

What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
 
IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the Hour
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
Cyber
Cyber Cyber
Cyber
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
 

More from ClubHack

India legal 31 october 2014
India legal 31 october 2014India legal 31 october 2014
India legal 31 october 2014ClubHack
 
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ BangaloreCyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ BangaloreClubHack
 
Summarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threatSummarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threatClubHack
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianClubHack
 
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...ClubHack
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodClubHack
 
Legal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalLegal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalClubHack
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar KuppanHybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar KuppanClubHack
 
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyHacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyClubHack
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiClubHack
 
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman GuptaContent Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman GuptaClubHack
 
Clubhack Magazine Issue February 2012
Clubhack Magazine Issue  February 2012Clubhack Magazine Issue  February 2012
Clubhack Magazine Issue February 2012ClubHack
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack
 
ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012ClubHack
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack
 
ClubHack Magazine – December 2011
ClubHack Magazine – December 2011ClubHack Magazine – December 2011
ClubHack Magazine – December 2011ClubHack
 
One link Facebook (Anand Pandey)
One link Facebook (Anand Pandey)One link Facebook (Anand Pandey)
One link Facebook (Anand Pandey)ClubHack
 
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)ClubHack
 
Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)ClubHack
 

More from ClubHack (20)

India legal 31 october 2014
India legal 31 october 2014India legal 31 october 2014
India legal 31 october 2014
 
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ BangaloreCyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
 
Summarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threatSummarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threat
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas Kurian
 
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
 
Legal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalLegal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara Agrawal
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar KuppanHybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
 
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyHacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish Bomisstty
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh Belgi
 
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman GuptaContent Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
 
Clubhack Magazine Issue February 2012
Clubhack Magazine Issue  February 2012Clubhack Magazine Issue  February 2012
Clubhack Magazine Issue February 2012
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012
 
ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012
 
ClubHack Magazine – December 2011
ClubHack Magazine – December 2011ClubHack Magazine – December 2011
ClubHack Magazine – December 2011
 
One link Facebook (Anand Pandey)
One link Facebook (Anand Pandey)One link Facebook (Anand Pandey)
One link Facebook (Anand Pandey)
 
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
 
Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)
 

Recently uploaded

On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 

Cyber Insurance

  • 1.
  • 2.
  • 3. BIG DATA BIGGER RISKS Increased use of electronic data - Smart phones, laptops, credit cards Cloud Computing - Concentration of large amounts of data in one place Stringent laws related to data breach – Section 43 A IT ACT (India), Sectorial laws regulation by SEBI and RBI (India ), The Financial Services Modernization Act (U.S.) HIPAA (U.S.), EU directives Too Big to fail ……?– No. of records compromised 1.Ebay – 145 Mn 2.Target – 70 Mn 3.Adobe – 152 mn 4.Sony PS– 77 Mn 5.Yahoo Japan – 22 Mn
  • 4. WHAT TRIGGERS A BREACH ? • BP employee loses laptop containing data on 13,000 oil spill claimants. •Malware installed in Target’s payment system. 40 MN credit card numbers compromised. •A phishing email disguised as originating from the RBI, promised its recipient prize money of Rs.10 Lakh within 48 hours, by giving a link which leads the user to a website that resembles the official website of RB with the similar logo and web address. Source: Ponemon Institute© Research Report 2013
  • 5. Growth of data breach • 253 network breaches in 2013 as against 208 in 2011 • Eight breaches in 2013 exposed more than 10 MN identities as against 5 in 2011 • In total 552 Mn identities were breached in 2013 It is no longer an IT issue but an active business risk VICTIM COSTS Notification Call Center Identity Monitoring (credit/non-credit) Identity Restoration DIRECT COSTS Discovery/Data Forensics Loss of Employee Productivity INDIRECT COSTS Restitution Additional Security and Audit Requirements Lawsuits Regulatory Fines OPPORTUNITY COSTS Loss of Consumer Confidence Loss of Funding $14.00 $10.00 $40.00 $140.00 Cost per record: $204 © Ponemon Institute
  • 6. Real life incidents 1. Commercial bank (over $5B in revenues, over $200B in assets) Lockbox containing backup tapes were lost in transit with tens of millions of personal data Over $10MM in crisis management has been paid to date Consumer class action suit has been brought 2. Online retailer (over $5B in revenues) Hacker accessed a server and obtained personal information of over 17 million customers Posted 2,000 records on a blog as proof and demanded over $1MM to not release the data To date over $1.5MM spend on Crisis Management expenses including notification and forensics Two class actions have been filed 3. Internet services company (about $1.5B in revenues) Unauthorized access led to viewing and downloading of personal information Multiple class actions have been filed Over $200,000 to date in defense 4. Credit card processor (over $1.5B in revenues) Employees allegedly accessed customer information of a client to make fraudulent transactions
  • 7. CYBER CRIME INSURANCE VS OTHER LIABILITY POLICIES Let’s look at some policies which are usually bought to manage business exposures. I.Errors and Omission II.Commercial General Liability III.Crime Insurance Coverages PI/CGL/Crime insurances Breach response costs No Legal liability to others for loss of data Partial Intellectual property infringement Partial Loss of revenue due to network breach No Regulatory investigations and civil fines and penalties No Cyber Extortion No
  • 8. HOW THE CYBER POLICY OPERATES ? Breach response costs Proactive forensic services, credit monitoring and cost of recreating data Crisis Management Expense Business interruption losses due to breach Ransom and security consultant costs Legal fees in connection with investigation Fines resulting from regulatory investigation  Liability of Loss of confidential information of individuals as well as corporates  Failure of network and information security to prevent the transmission of computer viruses or the penetration of a hacker  Infringement of a copyright by your website content Professional Indemnity Insurance HOW THE CYBER POLICY OPERATES ? Breach response costs Proactive forensic services, credit monitoring and cost of recreating data Crisis Management Expense Business interruption losses due to breach Ransom and security consultant costs Notification costs Fines resulting from regulator FIRST PARTY THIRD PARTY
  • 9. WHO ARE THE VICTIMS? Businesses should buy Cyber insurance if Their business activity is dependent upon IT systems Confidential data is handled in the course of business They have significant online presence and operations They process electronic payments Are required to do so contractually
  • 10. HOW CAN PRUDENT ASSIST ? Prudent has a specialist team of risk advisors including 6 dedicated liability lines professionals and 3 lawyers as full time employees We can help you in Arranging a review of the your IT systems through security experts Identifying gaps in your current insurances Designing a customized coverage solution for your cyber insurance needs Arranging the most cost effective cover from insurance and reinsurance markets Ensuring contract compliance from an insurance perspective Assisting you with the claims management in case of such an even Insurance Retention
  • 11. Ajit Singh Dhingra Managing Director Ajit@PrudentBrokers.com   Pavanjit Singh Dhingra Chief Executive Officer Pavan.Dhingra@PrudentBrokers.com Alda Dhingra Vice President - International Businesses AldaDhingra@PrudentBrokers.com Vijay Rampal Senior Vice President & Principal Officer Vijay.Rampal@PrudentBrokers.com Sanjay Vig Vice President - Liability & Specialty Lines Sanjay.Vig@PrudentBrokers.com Vikas Singh Vice President - Reinsurance Vikas.Singh@PrudentBrokers.com Mandar Dalvi Vice President - Reinsurance, Structured Products & Advisory Mandar.Dalvi@PrudentBrokers.com H V Karkare Vice President - Reinsurance HV.Karkare@PrudentBrokers.com Tanuj Gulani Vice President - Specialty Lines Tanuj.Gulani@PrudentBrokers.com
  • 12. Mumbai 101, Tower B Peninsula Business Park Lower Parel Mumbai 400 013 Tel: +91 22 3306 6000 Fax: +91 22 3306 6088 Delhi NCR Plot No. 462, Udyog Vihar, Phase V Gurgaon Haryana 122 016 Tel: +91 124 3999 000 Fax: +91 124 3999 010 Bangalore Floor III, Sai Shakti 2207 Hal Stage III, 80 Feet Road, Kodihalli Bangalore 560 008 Tel: +91 80 3024 2000 Fax: +91 80 3024 2060 Chennai Flat 1, 5th Floor, Gokul Tower, Plot # 7, CP Ramaswamy Road Alwarpet, Chennai 600 018 Tel: +91 44 3021 8700 Fax: +91 22 4265 8281 Pune 2nd Floor, “Adhisthan” CTS No.2134, Vijaynagar Colony, Sadashiv Peth, Pune-411030 Tel: +91 20 6560 2744 Fax: +91 20 2546 3338 Hyderabad D No-6-3-1093, Space No-606 6th Floor, VV Vintage Boulevard Raj Bhawan Road Somajiguda Hyderabad 500 082 Tel: +91 40 4003 8054 Registered Office: 217 Prabhadevi Estate, V S Marg, Mumbai - 400 025 Composite Broker License No. 291 | CIN No. U70100MH1982PTC027681 Copyright © 2014 Prudent Insurance Brokers Private Limited. All rights reserved. www.prudentbrokers.com Delhi NCR Eco Towers, 8th Floor, Plot No. 14, Sector 125, Noida 201 301

Editor's Notes

  1. In India there are about 40 policies which have been sold so far. Out of this about half are by technology companies about 10 for financial institutions, 5 for e commerce businesses and rest is a mix of other services and manufacturing. We are seeing a huge demand for such coverages driven both because of contract compliance and increase for risk in India.