Professional Documents
Culture Documents
Cyber Risk and Insurance BCI Vic/Tas Forum Event: Samuel Rogers
Cyber Risk and Insurance BCI Vic/Tas Forum Event: Samuel Rogers
Cyber Risk and Insurance BCI Vic/Tas Forum Event: Samuel Rogers
SAMUEL ROGERS
Account Manager & Cyber Insurance Specialist
Financial Lines Group - JLT
Cyber Risk
The Scale of Today’s Challenge
Cyber Risk – What is happening?
Globally:
US$2.1 Trillion
by
2019*
*The Future of Cybercrime & Security by Juniper Research
What Is Data Worth?
$114 Billion
$85 Billion
Ransomware
Still…..$1
Billion
Breaches And Hacks In The News
The Data Protection Landscape is Getting Tougher
SOURCE: www.dlapiperdataprotection.com
Privacy Amendment (Notifiable Data Breaches) Act 2017
4% 20%
Other Executive
40% 46% Management / 10% 18%
10,000+ grades
500-4,999 Board Healthcar Financial
employees employees Members e Services
31%
Middle
Mgmt
15%
Professional
Services /
14% 45% Consulting 17%
5,000-9,999 Senior Mgmt Technology
employees
11
JLT/HARVARD BUSINESS REVIEW RESEARCH
METHODOLOGY/PARTICIPANT PROFILE
7% 4%
Risk 15% Rest of
Management IT World
18% 45%
8% Asia / North
Sales / Pacific America
Business
Development
9% 33%
Consultin 13% EMEA
g General /
Executive Mgmt
12
85%
expect the financial impact of
cyber attacks and breaches to
rise in the next 1 to 2 years
Only
23%
have adopted a formal strategic
plan to address the business risks
of cyber attacks
KEY FINDINGS
STRUGGLING TO IMPROVE INTERNAL COLLABORATION
How integrated is your organisation’s functional team (e.g., CISO, compliance, general counsel,
CSO, procurement) in protecting against cyber attacks and breaches?
Very integrated
Numbers may not total
20% 100% due to rounding.
Somewhat integrated
37%
Minimally integrated
19%
Not integrated
8%
Don’t know
12%
15
KEY FINDINGS
CYBERSECURITY PITFALLS
16
WHAT’S STOPPING
PROGRESS?
1. Lack of resources
2. Lack of internal collaboration
3. Unclear return on investment
Isn’t this the IT department’s problem?
The human element is critical
in 95% of breaches
1% are unpreventable
…technology is 4% effective
- T Casey Fleming, BlackOps Partners
Most Breaches Rely On Human Error
• “Spear-phishing” email
Trends in 2015
30% of cyber
claims involve
insiders
Employees
PII
Customers
PII
Internal Customers
Corporate Corporate
What is Cyber Risk?
Cyber
Integrity, Reputation, Breach Business Interruption &
and Public Image Delays
34
Breach Response
Kidnap and
Ransom
Experts
Credit
Forensic Monitoring /
IT ID Theft
services
HOTLINE CALL TO
BREACH COACH
- LAWYER OR LOSS
Forensic ADJUSTING FIRM
Accountants Public
/ Loss Relations
Adjusters
Legal Notification /
advice Call Centre
Service
WHY ISN’T THIS ALREADY COVERED?
(IT MIGHT BE)
Cyber
exclusions
uncommon
37
Risk Factors
Risk Factors
Information technology?
-Desktop PCs Operational Technology?
- Websites
- Automated systems
- Email systems
- SCADA
- Payment processing systems
- Inventory / Invoicing systems
- Cloud systems / 3rd party IT providers
Risk Factors
Ask -
“How will your business “How will you absorb the
continue operating if your cost – time and money –
systems are taken in responding to a cyber
down?” incident?”
Queries?
Samuel Rogers
(03) 9613 1454
Samuel.Rogers@jlta.com.au