Cyber Insurance 2nd Edition
Table of Contents
|
Chapter 1: Identifying Cyber Risk for Insurance |
1 |
|
Debit & Credit Card Security Measures Cover Losses |
4 |
|
Interest in Cyber Insurance Grows |
4 |
|
Who is Vulnerable to Cyber Events? |
6 |
|
Insurers Recommend Freezing New Credit to Prevent Fraud Losses |
6 |
|
SIRF is Currently Uninsurable |
8 |
|
News From the Insurance Information Institute |
9 |
|
Cyber Crime Can Equate into Cyber Terrorism |
13 |
|
Insurance & Definitions Regarding “Act of War” |
14 |
|
Insuring Clouds for Data Storage |
15 |
|
The Hope of a More Secure System |
16 |
|
Banks Must Act to Prevent Losses |
17 |
|
Even Chip-and-PIN Cards Facing Fraud & Loss |
18 |
|
Insurance Industry’s Cyber Reports |
19 |
|
Chapter 2: Growth of Cyber Risk |
20 |
|
The question is: how did we get to this point? |
20 |
|
December 1969 |
21 |
|
June 1982 |
21 |
|
November 1988 |
19 |
|
March & April 1994 |
21 |
|
June 1997 through April-May 2007 |
22 |
|
June 2007 through April 2010 |
23 |
|
June 2010 through May 2012 |
24 |
|
May 2012 through July 2014 |
25 |
|
November 14 through July 2020 |
26 |
|
August 2020 through September 2020 |
27 |
|
October 2020 through December 2020 |
28 |
|
January & February 2021 |
29 |
|
March & April 2021 |
30 |
|
Mary & June 2021 |
31 |
|
Who is Vulnerable? |
32 |
|
The Future of Cyber Security Risks & Coverages |
34 |
|
Botnet |
35 |
|
Determining Who Needs Coverage |
35 |
|
Cyber Forensics |
36 |
|
Hacktivists |
36 |
|
Insurance Considers Current Risks |
37 |
|
Insurers Can Experience Risk, as well as Analyze It |
38 |
|
We are a Connected World |
38 |
|
Effective Risk Management Includes Insurance |
39 |
|
Risk Management is Ongoing |
40 |
|
Shadow IT |
41 |
|
API |
42 |
|
Industry Best Practices |
44 |
|
Insurers May Require Vetting of Third-Party Vendors |
44 |
|
Insurers Want Analytical Data, so Keep Track |
45 |
|
Working with Insurers |
45 |
|
Insurance Market Exists in Cyber Coverage |
46 |
|
Overlapping Coverage Issues |
47 |
|
War & Terrorism Policy Exclusion |
48 |
|
Chapter 3: Cyber Insurance Policy Provisions |
51 |
|
Defining Cyber War & Terrorism, Separate from Non-Cyber Events |
51 |
|
Types of Liability Policies |
52 |
|
Manifestation Theory |
53 |
|
Triple Trigger Theory |
53 |
|
Available third-party coverages |
54 |
|
The Policy |
55 |
|
Cyber Security Liability Coverage Form |
56 |
|
I. INSURING AGREEMENTS |
56 |
|
II. COVERED CAUSES OF LOSS |
58 |
|
III. DEFINITIONS |
59 |
|
IV. EXCLUSIONS |
65 |
|
V. YOU AND YOUR ORGANIZATION |
67 |
|
VI. TERRITORY |
67 |
|
VII. POLICY TERMS AND CONDITIONS |
67 |
|
Chapter 4: Cyber Risk Management |
75 |
|
Terrorism Risk Insurance Program Reauthorization Act |
75 |
|
Personal Privacy |
76 |
|
Recommendations for Placing Cyber Insurance |
77 |
|
The Challenge of Risk Management |
80 |
|
Cloud Vendors, Data Storage, & Cyber Policies |
81 |
|
The Legal Side of Cyber Breaches |
84 |
|
Commercial Policies vs. Cyber Liability Policies |
87 |
|
NAIC Principles for Effective Cybersecurity: Insurance Regulatory Guidance |
88 |
|
Data Security & Breach Notification Act of 2015 |
91 |
|
Cyber Security Bill of Rights |
92 |
|
Cybersecurity Bill of Rights for Insurance Consumers |
93 |
|
Chapter 5: Emerging Future of Cyber Risks |
95 |
|
The Future Challenges Insurers |
96 |
|
Security Intelligence |
97 |
|
Altered Data |
100 |
|
The Changing Face of Crime Means New Insuring Requirements |
100 |
|
Brick Attacks |
102 |
|
Biometric Security |
102 |
|
Genetic Testing |
103 |
|
Smart Meters |
103 |
|
Distance Crime Changes Insurance Picture |
104 |
|
Project 2020 |
104 |
|
Cyber Crime Insurance Risk |
106 |
|
Risk-Based & Control-Based Insurance Models |
107 |
|
Types of Cyber Criminal Threats |
108 |
|
When Cyber Crime Evolves into Potentially Insured Physical Threats |
108 |
|
Creation of Intelligent Computers |
109 |
|
Multiple Identities |
109 |
|
The Insurer’s Role |
110 |
|
CIO’s consider the following |
111 |
United Insurance Educators, Inc.
PO BOX 1030
Eatonville, WA. 98328