Cyber Insurance 2nd Edition
Table of Contents
Chapter 1: Identifying Cyber Risk for Insurance |
1 |
Debit & Credit Card Security Measures Cover Losses |
4 |
Interest in Cyber Insurance Grows |
4 |
Who is Vulnerable to Cyber Events? |
6 |
Insurers Recommend Freezing New Credit to Prevent Fraud Losses |
6 |
SIRF is Currently Uninsurable |
8 |
News From the Insurance Information Institute |
9 |
Cyber Crime Can Equate into Cyber Terrorism |
13 |
Insurance & Definitions Regarding “Act of War” |
14 |
Insuring Clouds for Data Storage |
15 |
The Hope of a More Secure System |
16 |
Banks Must Act to Prevent Losses |
17 |
Even Chip-and-PIN Cards Facing Fraud & Loss |
18 |
Insurance Industry’s Cyber Reports |
19 |
Chapter 2: Growth of Cyber Risk |
20 |
The question is: how did we get to this point? |
20 |
December 1969 |
21 |
June 1982 |
21 |
November 1988 |
19 |
March & April 1994 |
21 |
June 1997 through April-May 2007 |
22 |
June 2007 through April 2010 |
23 |
June 2010 through May 2012 |
24 |
May 2012 through July 2014 |
25 |
November 14 through July 2020 |
26 |
August 2020 through September 2020 |
27 |
October 2020 through December 2020 |
28 |
January & February 2021 |
29 |
March & April 2021 |
30 |
Mary & June 2021 |
31 |
Who is Vulnerable? |
32 |
The Future of Cyber Security Risks & Coverages |
34 |
Botnet |
35 |
Determining Who Needs Coverage |
35 |
Cyber Forensics |
36 |
Hacktivists |
36 |
Insurance Considers Current Risks |
37 |
Insurers Can Experience Risk, as well as Analyze It |
38 |
We are a Connected World |
38 |
Effective Risk Management Includes Insurance |
39 |
Risk Management is Ongoing |
40 |
Shadow IT |
41 |
API |
42 |
Industry Best Practices |
44 |
Insurers May Require Vetting of Third-Party Vendors |
44 |
Insurers Want Analytical Data, so Keep Track |
45 |
Working with Insurers |
45 |
Insurance Market Exists in Cyber Coverage |
46 |
Overlapping Coverage Issues |
47 |
War & Terrorism Policy Exclusion |
48 |
Chapter 3: Cyber Insurance Policy Provisions |
51 |
Defining Cyber War & Terrorism, Separate from Non-Cyber Events |
51 |
Types of Liability Policies |
52 |
Manifestation Theory |
53 |
Triple Trigger Theory |
53 |
Available third-party coverages |
54 |
The Policy |
55 |
Cyber Security Liability Coverage Form |
56 |
I. INSURING AGREEMENTS |
56 |
II. COVERED CAUSES OF LOSS |
58 |
III. DEFINITIONS |
59 |
IV. EXCLUSIONS |
65 |
V. YOU AND YOUR ORGANIZATION |
67 |
VI. TERRITORY |
67 |
VII. POLICY TERMS AND CONDITIONS |
67 |
Chapter 4: Cyber Risk Management |
75 |
Terrorism Risk Insurance Program Reauthorization Act |
75 |
Personal Privacy |
76 |
Recommendations for Placing Cyber Insurance |
77 |
The Challenge of Risk Management |
80 |
Cloud Vendors, Data Storage, & Cyber Policies |
81 |
The Legal Side of Cyber Breaches |
84 |
Commercial Policies vs. Cyber Liability Policies |
87 |
NAIC Principles for Effective Cybersecurity: Insurance Regulatory Guidance |
88 |
Data Security & Breach Notification Act of 2015 |
91 |
Cyber Security Bill of Rights |
92 |
Cybersecurity Bill of Rights for Insurance Consumers |
93 |
Chapter 5: Emerging Future of Cyber Risks |
95 |
The Future Challenges Insurers |
96 |
Security Intelligence |
97 |
Altered Data |
100 |
The Changing Face of Crime Means New Insuring Requirements |
100 |
Brick Attacks |
102 |
Biometric Security |
102 |
Genetic Testing |
103 |
Smart Meters |
103 |
Distance Crime Changes Insurance Picture |
104 |
Project 2020 |
104 |
Cyber Crime Insurance Risk |
106 |
Risk-Based & Control-Based Insurance Models |
107 |
Types of Cyber Criminal Threats |
108 |
When Cyber Crime Evolves into Potentially Insured Physical Threats |
108 |
Creation of Intelligent Computers |
109 |
Multiple Identities |
109 |
The Insurer’s Role |
110 |
CIO’s consider the following |
111 |
United Insurance Educators, Inc.
PO BOX 1030
Eatonville, WA. 98328