Cyber Insurance 2nd Edition
Table of Contents
| Chapter 1: Identifying Cyber Risk for Insurance | 1 | 
| Debit & Credit Card Security Measures Cover Losses | 4 | 
| Interest in Cyber Insurance Grows | 4 | 
| Who is Vulnerable to Cyber Events? | 6 | 
| Insurers Recommend Freezing New Credit to Prevent Fraud Losses | 6 | 
| SIRF is Currently Uninsurable | 8 | 
| News From the Insurance Information Institute | 9 | 
| Cyber Crime Can Equate into Cyber Terrorism | 13 | 
| Insurance & Definitions Regarding “Act of War” | 14 | 
| Insuring Clouds for Data Storage | 15 | 
| The Hope of a More Secure System | 16 | 
| Banks Must Act to Prevent Losses | 17 | 
| Even Chip-and-PIN Cards Facing Fraud & Loss | 18 | 
| Insurance Industry’s Cyber Reports | 19 | 
| Chapter 2: Growth of Cyber Risk | 20 | 
| The question is: how did we get to this point? | 20 | 
| December 1969 | 21 | 
| June 1982 | 21 | 
| November 1988 | 19 | 
| March & April 1994 | 21 | 
| June 1997 through April-May 2007 | 22 | 
| June 2007 through April 2010 | 23 | 
| June 2010 through May 2012 | 24 | 
| May 2012 through July 2014 | 25 | 
| November 14 through July 2020 | 26 | 
| August 2020 through September 2020 | 27 | 
| October 2020 through December 2020 | 28 | 
| January & February 2021 | 29 | 
| March & April 2021 | 30 | 
| Mary & June 2021 | 31 | 
| Who is Vulnerable? | 32 | 
| The Future of Cyber Security Risks & Coverages | 34 | 
| Botnet | 35 | 
| Determining Who Needs Coverage | 35 | 
| Cyber Forensics | 36 | 
| Hacktivists | 36 | 
| Insurance Considers Current Risks | 37 | 
| Insurers Can Experience Risk, as well as Analyze It | 38 | 
| We are a Connected World | 38 | 
| Effective Risk Management Includes Insurance | 39 | 
| Risk Management is Ongoing | 40 | 
| Shadow IT | 41 | 
| API | 42 | 
| Industry Best Practices | 44 | 
| Insurers May Require Vetting of Third-Party Vendors | 44 | 
| Insurers Want Analytical Data, so Keep Track | 45 | 
| Working with Insurers | 45 | 
| Insurance Market Exists in Cyber Coverage | 46 | 
| Overlapping Coverage Issues | 47 | 
| War & Terrorism Policy Exclusion | 48 | 
| Chapter 3: Cyber Insurance Policy Provisions | 51 | 
| Defining Cyber War & Terrorism, Separate from Non-Cyber Events | 51 | 
| Types of Liability Policies | 52 | 
| Manifestation Theory | 53 | 
| Triple Trigger Theory | 53 | 
| Available third-party coverages | 54 | 
| The Policy | 55 | 
| Cyber Security Liability Coverage Form | 56 | 
| I. INSURING AGREEMENTS | 56 | 
| II. COVERED CAUSES OF LOSS | 58 | 
| III. DEFINITIONS | 59 | 
| IV. EXCLUSIONS | 65 | 
| V. YOU AND YOUR ORGANIZATION | 67 | 
| VI. TERRITORY | 67 | 
| VII. POLICY TERMS AND CONDITIONS | 67 | 
| Chapter 4: Cyber Risk Management | 75 | 
| Terrorism Risk Insurance Program Reauthorization Act | 75 | 
| Personal Privacy | 76 | 
| Recommendations for Placing Cyber Insurance | 77 | 
| The Challenge of Risk Management | 80 | 
| Cloud Vendors, Data Storage, & Cyber Policies | 81 | 
| The Legal Side of Cyber Breaches | 84 | 
| Commercial Policies vs. Cyber Liability Policies | 87 | 
| NAIC Principles for Effective Cybersecurity: Insurance Regulatory Guidance | 88 | 
| Data Security & Breach Notification Act of 2015 | 91 | 
| Cyber Security Bill of Rights | 92 | 
| Cybersecurity Bill of Rights for Insurance Consumers | 93 | 
| Chapter 5: Emerging Future of Cyber Risks | 95 | 
| The Future Challenges Insurers | 96 | 
| Security Intelligence | 97 | 
| Altered Data | 100 | 
| The Changing Face of Crime Means New Insuring Requirements | 100 | 
| Brick Attacks | 102 | 
| Biometric Security | 102 | 
| Genetic Testing | 103 | 
| Smart Meters | 103 | 
| Distance Crime Changes Insurance Picture | 104 | 
| Project 2020 | 104 | 
| Cyber Crime Insurance Risk | 106 | 
| Risk-Based & Control-Based Insurance Models | 107 | 
| Types of Cyber Criminal Threats | 108 | 
| When Cyber Crime Evolves into Potentially Insured Physical Threats | 108 | 
| Creation of Intelligent Computers | 109 | 
| Multiple Identities | 109 | 
| The Insurer’s Role | 110 | 
| CIO’s consider the following | 111 | 
United Insurance Educators, Inc.
PO BOX 1030
Eatonville, WA. 98328