CyberEdge. End-to-End Cyber Risk Management Solutions

Similar documents
CyberEdge. End-to-End Cyber Risk Management Solutions

WHY AIG. What s Inside. CyberEdge. Click here. For full pdf features, please view in Adobe Acrobat.

Cyber Attack: Is Your Business at Risk?

CYBER RESILIENCE & INCIDENT RESPONSE

External Supplier Control Obligations. Cyber Security

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

How to be cyber secure A practical guide for Australia s mid-size business

Cybersecurity The Evolving Landscape

CYBER INSURANCE: MANAGING THE RISK

Incident Response Services

The Evolving Threat to Corporate Cyber & Data Security

Are we breached? Deloitte's Cyber Threat Hunting

Background FAST FACTS

People risk. Capital risk. Technology risk

Sage Data Security Services Directory

BHConsulting. Your trusted cybersecurity partner

Changing the Game: An HPR Approach to Cyber CRM007

CYBER INCIDENT RESPONSE. cfcunderwriting.com

Jeff Wilbur VP Marketing Iconix

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

BHConsulting. Your trusted cybersecurity partner

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

Cyber Insurance: What is your bank doing to manage risk? presented by

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

Cyber Risks in the Boardroom Conference

with Advanced Protection

Governance Ideas Exchange

Avanade s Approach to Client Data Protection

Defensible and Beyond

Enhance Your Cyber Risk Awareness and Readiness. Singtel Business

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

THE CYBER SECURITY PLAYBOOKECTOR SHOULD KNOW BEFPRE, DURING & AFTER WHAT EVERY DIRECTOR SHOULD KNOW BEFORE, DURING AND AFTER AN ATTACK

May the (IBM) X-Force Be With You

TRUE SECURITY-AS-A-SERVICE

Department of Management Services REQUEST FOR INFORMATION

TECHLAW AUSTRALIA. Update on cyber security and data protection. Thursday, 22 June Thursday, 22 June

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

HOSTED SECURITY SERVICES

Cyber Security Incident Response Fighting Fire with Fire

locuz.com SOC Services

Best Practices in Securing a Multicloud World

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

CYBER INCIDENT RESPONSE. cfcunderwriting.com

ForeScout Extended Module for Splunk

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

RSA INCIDENT RESPONSE SERVICES

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

Start. CyberEdge Playbook. A broker guide to selling cyber insurance

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

Cyber security tips and self-assessment for business

Cybersecurity and Nonprofit

2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Cybersecurity What Companies are Doing & How to Evaluate. Miguel Romero - NAIC David Gunkel & Dan Ford Rook Security

IoT & SCADA Cyber Security Services

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

2016 Data Protection & Breach Readiness Webinar Will Start Shortly. please download the guide at

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

Security by Default: Enabling Transformation Through Cyber Resilience

Cybersecurity Today Avoid Becoming a News Headline

Vulnerability Assessments and Penetration Testing

RSA INCIDENT RESPONSE SERVICES

SIEMLESS THREAT DETECTION FOR AWS

Moving from Prevention to Detection March 2017

GDPR: An Opportunity to Transform Your Security Operations

Choosing the Right Security Assessment

Security Information & Event Management (SIEM)

Cybersecurity: Pre-Breach Preparedness and Post-Breach Duties

2017 RIMS CYBER SURVEY

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

ACM Retreat - Today s Topics:

Incident Response and Cybersecurity: A View from the Boardroom

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Cyber and data security How prepared is your charity?

Global Security Consulting Services, compliancy and risk asessment services

You ve Been Hacked Now What? Incident Response Tabletop Exercise

Protecting your next investment: The importance of cybersecurity due diligence

Cyber Security Program

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Symantec Security Monitoring Services

INTELLIGENCE DRIVEN GRC FOR SECURITY

Security-as-a-Service: The Future of Security Management

Orchestrating and Automating Trend Micro TippingPoint and IBM QRadar

Continuous protection to reduce risk and maintain production availability

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

An ICS Whitepaper Choosing the Right Security Assessment

Governing cyber security risk: It s time to take it seriously Seven principles for Boards and Investors

COPE-ing with Cyber Risk Exposures

SECURITY SERVICES SECURITY

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

CYBER SOLUTIONS & THREAT INTELLIGENCE

Transcription:

CyberEdge End-to-End Cyber Risk Management Solutions

In a rapidly changing landscape, CyberEdge provides clients with an end-to-end risk management solution to stay ahead of the curve of cyber risk. CyberEdge provides the insurance coverage, tools, and continued access to emerging best practices learned from our years covering this risk and from the cyber experts we work with necessary for clients to assess and mitigate potential vulnerabilities to sensitive data breaches, computer hacking, employee error, and more. 2

CyberEdge Risk Management Solution From our innovative loss prevention tools to educate and potentially prevent a breach, to the services of our CyberEdge Breach Resolution Team if a breach does occur, insureds receive responsive guidance every step of the way. Risk Consultation and Prevention Insurance Coverage Breach Resolution Team Education and Knowledge Third Party Loss Resulting From a Security or Data Breach 24/7 Guidance: Training and Compliance Direct First Party Costs of Responding to a Breach Legal and Forensic Services Global Threat Intelligence and Assessment Reduction in Net Profit and Operating Expense resulting from a Security or Data Breach Notification, Credit, and ID Monitoring Call Center Blacklist IP Blocking & Domain Protection Threats to Disclose Data or Attack a System to Extort Money Crisis Communication Experts Expert Advice and Consultation Online Defamation and Copyright and Trademark Infringement Over 15 Years Experience Handling Cyber-Related Claims 3

Risk Consultation and Prevention The protection that CyberEdge provides is a valuable additional layer to the most powerful first line of defence against cyber threats, a company s own IT system. Constantly monitoring the cyber landscape, we keep insureds at the forefront of the industry as cyber risks continue to evolve. Our preventative tools provide our clients with the knowledge, training, security, and consultative solutions to help them stay ahead of the curve. CyberEdge Mobile App for iphone, ipad, and Android TM The CyberEdge Mobile App combines the latest cyber breach information, news, opinion, and risk analysis users want at their fingertips. With a sleek look and many global features, the app is the first-of-its-kind and available for iphone, ipad, and Android. Features include: Data Breach Threat Map that displays breaches occurring around the world, including information about breach notification laws in the country where the breach occurred. Claims narratives providing examples of real-world cyber breaches covered by CyberEdge. Breach calculator, allowing users to input their company s details to calculate the potential costs associated with a data breach. Majority of the content available in English, French, and Spanish. 4

Infrastructure Vulnerability Scanning Powered by IBM Our qualified clients receive infrastructure vulnerability scanning powered by IBM. IBM conducts remote scanning for clients web-facing external infrastructures, which helps to identify potential vulnerabilities that could be exploited by a remote hacker via the internet. In addition, the infrastructure vulnerability scanning service: Detects and prioritises hidden risks on public-facing network infrastructure. Provides a detailed view of a company s vulnerability status so clients can better track, understand, and report on their security posture. Prioritises vulnerabilities so clients reduce their overall threat exposure. Includes unique reporting capabilities to help speed vulnerability identification and remediation. 5

BitSight Security Ratings BitSight generates security ratings for organisations to measure and monitor their own network and those of their third-party vendors. The ratings are generated unobtrusively through BitSight s continuous measuring of externally observable data. Security ratings are based on evidence of the following: Observed security events, or evidence of successful cyber attacks. This includes communication with botnets, spam, malware, and more. Diligence data points, or indicators of whether a company has taken steps to prevent an attack. This includes proper security configuration analysis. Qualified CyberEdge insureds will be eligible to receive a complimentary BitSight Security Rating report to measure the organisation s security performance. CyberEdge policyholders are also eligible for reduced rates on BitSight s products and services. Insureds can choose to arm themselves with daily ratings as part of their end-to-end cyber risk management program, allowing them to have insight into cybersecurity risk throughout their ecosystem. Blacklist IP Blocking & Domain Protection - Powered by Bandura Systems Qualifying CyberEdge Policyholders receive access to Threat Blocking service provided by Bandura Systems and powered by Poliwall. The IP & domain blocking service reduces the attack surface up to 90% ahead of the firewall with virtually no network latency. Leveraging domain based intelligence from a variety of sources to auto-block over 10 million domain threats aggregated with the 100 million IP threats the Poliwall deploys, providing automated and comprehensive cyber risk mitigation. The Domain Blocking Service can incorporate client s own Domain black list and includes dashboard reporting. 6

Cyber security Awareness Training - Powered by TechGuard Cybersecurity awareness training can assist an organisation to resist additional attack vectors such as Phishing and other social engineering based attacks. Qualified clients receive access to Techguard SHIELD training modules, providing a comprehensive, engaging, relevant, and sustainable cyber security awareness training platform. Over 40+ training topics available in 11 languages, with targeted customisable training for specific organisation roles and employee needs, the service includes industry leading analytics and automated reporting to track progress and guide future needs. Qualified clients also have access to a Phishing Tool that tests and validates cyber security awareness training effectiveness. 7

Insurance Coverage CyberEdge can provide companies with protection against the following: Third-party claims arising from a failure of the insured s network security or a failure to protect data. Insurance also responds to regulatory actions in connection with a security failure, privacy breach, or the failure to disclose a security failure or privacy breach. Direct first-party costs of responding to a security failure or privacy breach by paying costs of notifications, public relations, and other services to assist in managing and mitigating a cyber incident. Forensic investigations, legal consultations, and identity monitoring costs for victims of a breach are all covered. Business interruption caused by a network security failure by reimbursing for resulting reduction in net profit and operating expenses. Insurance also responds to customer churn and reputational damage. Threats made against a company s computer network and confidential information by an outsider attempting to extort money, or other valuables. Coverage includes monies paid to end the threat and the cost of an investigation to determine the cause of the threat. Liability faced by companies for content distributed on their website. Coverage is provided for numerous media perils including copyright infringement, trademark infringement, defamation, and invasion of privacy. Breach Resolution Team The CyberEdge Breach Resolution Team is ready to assist insureds as soon as they suspect a potential network breach. Our team has local presence supported by global resources, allowing our experts to manage unfolding events and quickly respond to inquiries. If a breach is suspected to occur, insureds will be connected by our CyberEdge Breach Resolution Team with more than 15 years of experience in handling cyber-specific claims. Claims specialists have the authority to promptly make decisions and rapidly assist clients who may have just faced a breach. 8

Since introducing cyber liability insurance in 1999, we have helped thousands of companies and more than twenty million individuals respond to cyber attacks. The breadth of our claims inventory means that we are uniquely positioned to identify and anticipate claim trends and settlement values. On average, our claims specialists have more than seven years of industry experience handling the most complex first party and third party cyber claims. Backed by the strength of our extensive vendor network, the CyberEdge Breach Resolution Team provides the additional layer of support an IT department needs to face a cyber attack. Our cyber response team contains technical experts, experienced incident managers and forensic specialists. Expert legal assistance is provided through our partnership with leading law firms. When a breach event occurs, time is of the essence. Having a response plan in place with access to third party resources will help you efficiently and cost-effectively respond to and recover from a breach. 24/7 access to our call centre for claim reporting and guidance. Single point of entry to report, acknowledge, and process claims in a timely fashion. Access to our local claims specialists on the ground around the world. Access to a panel of international lawyers with local expertise in handling cyber claims. 9

aig.com.au/ NEW SOUTH WALES Head Office Level 19, 2 Park Street SYDNEY NSW 2000 Phone +61 2 9240 1711 Fax +61 2 9240 1722 VICTORIA Level 12, 717 Bourke Street DOCKLANDS VIC 3008 Phone +61 3 9522 4000 Fax +61 3 9522 4645 QUEENSLAND Level 11, 120 Edward Street BRISBANE QLD 4000 Phone +61 7 3220 0700 Fax +61 7 3220 0441 WESTERN AUSTRALIA Level 11, 108 St. Georges Terrace PERTH WA 6000 Phone +61 8 9421 3300 Fax +61 8 9218 9434 Download the CyberEdge Mobile App Follow CyberEdge Follow@AIGinsurance American International Group, Inc. (AIG) is a leading international insurance organization serving customers in more than 100 countries. AIG companies serve commercial, institutional, and individual customers through one of the most extensive worldwide property-casualty networks of any insurer. In addition, AIG companies are leading providers of life insurance and retirement services in the United States. AIG common stock is listed on the New York Stock Exchange and the Tokyo Stock Exchange. Additional information about AIG can be found at www.aig.com YouTube: www.youtube.com/aig Twitter: @AIG_LatestNews LinkedIn: http://www.linkedin. com/company/aig This document is provided as a general overview of the subject matter and should not be taken as providing any specific advice, legal or otherwise. Insurance products are issued in Australia by AIG Australia Limited ABN 93 004 727 753 AFSL No 381686. AIG is the marketing name for the worldwide propertycasualty, life and retirement, and general insurance operations of American International Group, Inc. For additional information, please visit our websites at www.aig.com and www.aig.com.au AUSL00002588 CyberEdge Services Br 2018