Understanding Cyber Insurance & Regulatory Drivers for Business Continuity

Similar documents
Business continuity management and cyber resiliency

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe

Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise

Cybersecurity and Nonprofit

Cybersecurity Auditing in an Unsecure World

Brussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

Business Continuity Management

Why you should adopt the NIST Cybersecurity Framework

Disaster Recovery and Business Continuity Planning (Mile2)

Moving from Prevention to Detection March 2017

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

Cyber Insurance: What is your bank doing to manage risk? presented by

EU General Data Protection Regulation (GDPR) Achieving compliance

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

Cyber Resilience. Think18. Felicity March IBM Corporation

Information Security Is a Business

Cyber Due Diligence: Understanding the New Normal in Corporate Risk

2017 RIMS CYBER SURVEY

Cybersecurity The Evolving Landscape

Cybersecurity Today Avoid Becoming a News Headline

CYBER INSURANCE: MANAGING THE RISK

Cyber Attack: Is Your Business at Risk?

TSC Business Continuity & Disaster Recovery Session

Building a Resilient Security Posture for Effective Breach Prevention

Business Continuity Management Standards A Side-by-Side Comparison

CYBER SECURITY WORKSHOP NOVEMBER 2, Anurag Sharma [CISA, CISSP, CRISC] Principal Cyber & Information Security Services

AIRMIC ENTERPRISE RISK MANAGEMENT FORUM

2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action

Data Breach Preparation and Response. April 21, 2017

Cyber Security. Activities of an national insurance association based on the example of VVO

Cyber Risks in the Boardroom Conference

The NIS Directive and Cybersecurity in

MITIGATE CYBER ATTACK RISK

Cybersecurity Landscape and Risk Considerations

European Union Agency for Network and Information Security

The Impact of Cybersecurity, Data Privacy and Social Media

Unified Communications Phase 2 Presentation to IT Services Users Group

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

Speakers. Shellie Zavatsky Director of Internal Audit at Hurley Medical Center. Trent Long Director of Managed Privacy Services at FairWarning, Inc

How will cyber risk management affect tomorrow's business?

Healthcare HIPAA and Cybersecurity Update

November 14, Emergency Management and Hurricane Irma. Florida Human Resources People and Strategy (FLHRPS)

Incident Response Table Tops

4/5/2017. April 5, 2017 CYBER-RISK: WHAT MANAGEMENT & BOARDS NEED TO KNOW

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

Systemic Cyber Risk and Cyber Insurance. February 14, 2018

Securing Digital Transformation

ISACA West Florida Chapter - Cybersecurity Event

Cyber Security. The Question of the Day. Sylint Group, Inc. How did we come up with the company name Sylint and what does it mean?

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

Putting security first for critical online brand assets. cscdigitalbrand.services

Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Cyber Security in M&A. Joshua Stone, CIA, CFE, CISA

The Cyber War on Small Business

Building a BC/DR Control Library and Regulatory Response Program

Cyber Risk for. Small and Medium-Sized Enterprises (SMEs)

A Checklist for Cybersecurity and Data Privacy Diligence in TMT Transactions

American Association of Port Authorities Port Security Seminar & Expo Cyber Security Preparedness and Resiliency in the Marine Environment

What It Takes to be a CISO in 2017

Physical security advisory services Securing your organisation s future

Bradford J. Willke. 19 September 2007

UPDATE: HEALTHCARE CYBERSECURITY & INCIDENT RESPONSE Lindsay M. Johnson, Esq. Partner, Freund, Freeze & Arnold, LPA

Critical Information Infrastructure Protection Law

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Cybersecurity What Companies are Doing & How to Evaluate. Miguel Romero - NAIC David Gunkel & Dan Ford Rook Security

Data Privacy & Protection

Altitude Software. Data Protection Heading 2018

Ransomware, Viruses, and Hackers in Health Care: Five Steps to Avoid Being the Next Victim. Michael Overly and Chanley Howell.

Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International.

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Data Protection in Practice

People risk. Capital risk. Technology risk

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

AN IPSWITCH WHITEPAPER. 7 Steps to Compliance with GDPR. How the General Data Protection Regulation Applies to External File Transfers

Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016

Business Continuity Planning

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

Protecting your next investment: The importance of cybersecurity due diligence

HOSTED SECURITY SERVICES

Preparing for a Breach October 14, 2016

Rethinking Information Security Risk Management CRM002

Cybersecurity Session IIA Conference 2018

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

112 th Annual Conference May 6-9, 2018 St. Louis, Missouri

Changing the Game: An HPR Approach to Cyber CRM007

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise

June 2 nd, 2016 Security Awareness

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Agenda. Security essentials. Year in review. College/university challenges. Recommendations. Agenda RSM US LLP. All Rights Reserved.

Cybersecurity and the Board of Directors

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

CYBER SECURITY AIR TRANSPORT IT SUMMIT

Cybersecurity for Service Providers

Cyber Resiliency. Felicity March. May 2018

Introduction to Business continuity Planning

Transcription:

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity Lily Yeoh, CISSP, CBCP lily@cb1security.com https://www.cb1security.com

Agenda BC/DR Business Drivers Recent Regulatory & Cyber Insurance Evolution BC/DR Capability Maturity Model Risk Mitigation Trends

Top BC/DR Business Drivers Regulations Cyber Insurance Cyber breach / business interruption Business agreements / contracts Supply chain/third party risk due diligence Risk Management

BC/DR Drivers Top 10 Threats 1. Cyber attack 2. Data breach 3. Unplanned IT & communication outages 4. Act of terrorism 5. Security incident 6. Interruption to utility supply 7. Supply chain disruption 8. Adverse weather 9. Availability of key skills (or lack of talent) NEW 10. Health and safety incident NEW

BC/DR Threats Catastrophic Events There are only two types of companies: those that have been hacked and those that will be. Robert S. Mueller III, former FBI Director 2017 Jan 1- Jun 30 2,227 publically disclosed breaches 6 billions records loss (already higher than the entire year of 2016) 46% profile decrease post breach Millions of victims Billions of dollars in economic damages and high unemployment rate Data Breach Risks Caused by Hacking, Skimming, Phishing, viruses, iot, dark web, ransomware, application code

Current Regulatory Drivers Loss amount includes fines, legal fees, and more Healthcare Insurance Government Global Cybersecurity Act 2015 HiTRUST CSF v9-scheduled for Q3, 2017 NAIC Cybersecurity regulation for Data Security Model Law v5 Executive Order for Cybersecurity (M-17-25) May 2017 Critical Infrastructure Cybersecurity Order 13636 New York DFS part 500 State Law EU GDPR (May 2016, enforcement May 25, 2018)

Cyber Insurance Data Security Model Law Summary Securing a cyber-liability policy is NOT simple Cyber Insurance premiums shot up 32% (2016); coverage limiting $100M Insurer writing will evaluate the following elements: Risk Management techniques applied to the business to protect network and assets Business disaster response plans and will evaluate to make sure they are comprehensive (network, website, physical assets and its intellectual property) Understand employees and others accessing data At a minimum, basic protection controls are in-place

BC/DR Capability Maturity Model Where are you now? 20% 5% 4-Monitored & Analyzed 5-Orchestrated Resiliency Testing & Exercising, Training & Awareness Integrate systems for scale across the enterprise RTO Hours $$$$ 60% 3-Managed Breaking down the silos; working with the business to own BC/DR plans 15% 2-Documented Out-dated Plans & Gaps Resource Challenges to keep up with plans 1-Ad-Hoc Audit Issues Sharepoint & Binders Months-to- Never $

Risk Mitigation Trends BC/DR is a risk mitigation function; how are you protecting the business? Integrated technologies to be more efficient Manage gaps for operational resiliency Interdependencies (policies, upstream/downstream) External third parties (utilities, internet providers, housing/facilities) early alerts and communication to reduce exposure time (crisis notifications and social media)

Thank you! Speaker: Company: Contact Info: Lily Yeoh CyberOne Security Inc. https://www.cb1security.com lily@cb1security.com 415.913.0349