SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Cyber Exposures: Risks
Well-Suited for Captive
Insurers

Jean Lamfers, Esq.
Author of Cyber Insurance Policies, Consultant to
National & International Insurers and Partner
with the Law Firm of
Lamfers, Sheehan & Ozegovic, LLC
WeSimplifyLaw.com and Lsolaw.com
913-962-8200
Why Is Cyber Exposure a
    Concern for My Business?
    Because virtually all businesses access or
     store confidential information.
    Because employees and independent
     contractors DO make mistakes in how
     they handle private information.
    Because the employer is responsible for
     the acts of their employees.
    Because federal and state laws, in
     response to constituents’ demands, have
     evolved into essentially “strict liability”
     for privacy breaches.
Examples of Common, Recent
    Incidents
       Theft of Mobile Devices
    ◦     A county-owned laptop was stolen from a
          Las Vegas hotel room with 35,000 county
          residents’ personal information
    ◦     Info came from Dept of Motor Vehicles
          included social security numbers & drivers’
          license numbers
    ◦     The good news: The device was password
          protected.
    ◦     The bad news: Regardless of password
          protection, the county had to notify
          potentially affected residents and take other
          remedial actions.
Examples of Common, Recent
    Incidents
       Security Companies Are Breached
    ◦     RSA, known for their patented, second-layer
          password protection system, was secretly
          sabotaged for an extended time period
    ◦     The system uses keychain fobs, which
          receive & display numerical sequences
          updated approx. every 60 seconds
    ◦     Users enter the displayed sequence from the
          fob within a given time as a secondary
          password protection to access their
          company’s computers remotely
    ◦     The system was in use by many high-
          security industries and the government
Examples of Common, Recent
    Incidents
       Paper Data Breaches Are Common
    ◦     A billing service for 4 hospitals in MA
          improperly “recycled” 3 years of patient
          records at a recycling transfer station
    ◦     A newspaper employee witnessed the
          “disposal” and retrieved samples
    ◦     The result: a public relations nightmare and
          overwhelming notification/audit process
Examples of Common, Recent
    Incidents
       Rogue Employees
    ◦     During an investigation of an employee’s
          own residential burglary, police found more
          than they expected
    ◦     A Thomson CompuMark Data employee was
          implicated after police collected info
          suggesting the employee had removed paper
          records with customer payment card info
          from his employer
    ◦     These types of incidents occur with hair-
          raising frequency in the restaurant, hotel,
          retail and nearly-every, consumer-related
          industry.
Costs and Outcomes Can Be
Extraordinary
 Florida Attorney General settled with a check
  services company for $850,000 for its investigative
  costs and attorney’s fees plus $125,000 contribution
  to an educational crime prevention program. A
  former employee stole the personal data. (He’s
  serving nearly 5 years in federal prison.)
 State and federal regulators are using high profile
  incidents with sizeable awards or settlements as
  examples to spur prevention and curb knowing
  violations.
What Does Cyber Insurance
 Cover?
Damages claims by third parties
 for network security breaches
Costs incurred to notify persons
 impacted by a data breach
Regulatory fines imposed by
 governments
Costs to restore data lost or
 compromised
Investigation costs for computer
 forensic analysis
What Does Cyber Insurance
 Cover?
Crisis management costs--public
 relations and damage control
Coverage for losses to or caused
 by data that’s maintained by a
 third party on your company’s
 behalf
Coverage for “gaps” in typical
 general liability policies for
 claims arising out of the creation
 and distribution of content on
 websites, blogs, or social media
Why Choose a Captive for
    Cyber Risks?
    Captives can deliver cyber insurance
     uniquely tailored for your business.
    You and your program developer
     decide what risks to insure.
    Risk management and risk audits can
     improve your bottom line.
    Top-Down implementation is more
     successful, which the captive structure
     inherently encourages.
The Law Firm of Lamfers,
Sheehan & Ozegovic, LLC
 Relevant experience writing cyber insurance and
  errors and omissions insurance policies for well-
  known companies
 Extensive claims management experience in niche
  markets of technology, media, cyber and privacy
 Ability to deliver risk management and ongoing
  product support without the large firm overhead.
 Insurance industry contacts for successful
  placement of any requisite reinsurance.
Cyber Exposures: Risks
Well-Suited for Captive
Insurers
Jean Lamfers, Esq.
Author of Cyber Insurance Policies, Consultant to
National & International Insurers and Partner
with the Law Firm of
Lamfers, Sheehan & Ozegovic, LLC
6333 Long Avenue, Suite 102
Shawnee, Kansas 66216
WeSimplifyLaw.com and Lsolaw.com
913-962-8200
jl@lamferslaw.com

Weitere ähnliche Inhalte

Was ist angesagt?

The Insider Threat
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasuresKAMRAN KHALID
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudWynyard Group
 
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeDavid Mai, MBA
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes ObserveIT
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?ObserveIT
 
Information Security
Information SecurityInformation Security
Information Securityikonick
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspacetimmcguinness
 
Malicious Insiders
Malicious InsidersMalicious Insiders
Malicious Insidersgjohansen
 
Kimo David.resume 2016
Kimo David.resume 2016Kimo David.resume 2016
Kimo David.resume 2016Kimo David
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityDavid Mai, MBA
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01rajkumar jonuboyena
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackMekhi Da ‘Quay Daniels
 
Insider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionInsider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionObserveIT
 
Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Thomas Lee
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss PreventionSeqrite
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the worldSeqrite
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatMike Saunders
 

Was ist angesagt? (20)

The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Insider threat
Insider threatInsider threat
Insider threat
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasures
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraud
 
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric Cole
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?
 
Information Security
Information SecurityInformation Security
Information Security
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspace
 
Malicious Insiders
Malicious InsidersMalicious Insiders
Malicious Insiders
 
Powerpoint v7
Powerpoint v7Powerpoint v7
Powerpoint v7
 
Kimo David.resume 2016
Kimo David.resume 2016Kimo David.resume 2016
Kimo David.resume 2016
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level Priority
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
 
Insider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionInsider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat Detection
 
Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-Threat
 

Andere mochten auch

Socil Networking Application
Socil Networking ApplicationSocil Networking Application
Socil Networking ApplicationS S Ram
 
Arnold & Porter on Fraudulent Conveyance
Arnold & Porter on Fraudulent ConveyanceArnold & Porter on Fraudulent Conveyance
Arnold & Porter on Fraudulent ConveyanceChand Sooran
 
How to increase the effectiveness of your live chat performance?
How to increase the effectiveness of your live chat performance?How to increase the effectiveness of your live chat performance?
How to increase the effectiveness of your live chat performance?UserEngage
 
Engage Users Along Their Journey
Engage Users Along Their JourneyEngage Users Along Their Journey
Engage Users Along Their JourneyUserEngage
 
social media 247 - a marketing model - 2014 version
social media 247 - a marketing model - 2014 versionsocial media 247 - a marketing model - 2014 version
social media 247 - a marketing model - 2014 versionIngmar de Lange
 
Social Media Marketing for Health Insurance
Social Media Marketing for Health InsuranceSocial Media Marketing for Health Insurance
Social Media Marketing for Health InsuranceSocial Samosa
 
2014 Digital-Inspired Trends in the Financial Services Industry: Banks, Card ...
2014 Digital-Inspired Trends in the Financial Services Industry: Banks, Card ...2014 Digital-Inspired Trends in the Financial Services Industry: Banks, Card ...
2014 Digital-Inspired Trends in the Financial Services Industry: Banks, Card ...Carmelon Digital Marketing
 
Intro to e-commerce and e-business
Intro to e-commerce and e-businessIntro to e-commerce and e-business
Intro to e-commerce and e-businessMoodleAdmin
 
E-Business Concept
E-Business ConceptE-Business Concept
E-Business ConceptLatte Media
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking PresentationAnusorn Kansap
 
Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCapri Insurance
 
Social networking PPT
Social networking PPTSocial networking PPT
Social networking PPTvarun0912
 

Andere mochten auch (15)

Socil Networking Application
Socil Networking ApplicationSocil Networking Application
Socil Networking Application
 
Arnold & Porter on Fraudulent Conveyance
Arnold & Porter on Fraudulent ConveyanceArnold & Porter on Fraudulent Conveyance
Arnold & Porter on Fraudulent Conveyance
 
A Primer on Fraudulent Transfer Law
A Primer on Fraudulent Transfer LawA Primer on Fraudulent Transfer Law
A Primer on Fraudulent Transfer Law
 
How to increase the effectiveness of your live chat performance?
How to increase the effectiveness of your live chat performance?How to increase the effectiveness of your live chat performance?
How to increase the effectiveness of your live chat performance?
 
Engage Users Along Their Journey
Engage Users Along Their JourneyEngage Users Along Their Journey
Engage Users Along Their Journey
 
social media 247 - a marketing model - 2014 version
social media 247 - a marketing model - 2014 versionsocial media 247 - a marketing model - 2014 version
social media 247 - a marketing model - 2014 version
 
Social Media Marketing for Health Insurance
Social Media Marketing for Health InsuranceSocial Media Marketing for Health Insurance
Social Media Marketing for Health Insurance
 
2014 Digital-Inspired Trends in the Financial Services Industry: Banks, Card ...
2014 Digital-Inspired Trends in the Financial Services Industry: Banks, Card ...2014 Digital-Inspired Trends in the Financial Services Industry: Banks, Card ...
2014 Digital-Inspired Trends in the Financial Services Industry: Banks, Card ...
 
E-Business & E-Commerce Basics
E-Business & E-Commerce BasicsE-Business & E-Commerce Basics
E-Business & E-Commerce Basics
 
Intro to e-commerce and e-business
Intro to e-commerce and e-businessIntro to e-commerce and e-business
Intro to e-commerce and e-business
 
E-Business Concept
E-Business ConceptE-Business Concept
E-Business Concept
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking Presentation
 
Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutions
 
Social networking PPT
Social networking PPTSocial networking PPT
Social networking PPT
 
E commerce
E commerceE commerce
E commerce
 

Ähnlich wie Captive Insurance and Cyber Risk

InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsOilPriceInformationService
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Netpluz Asia Pte Ltd
 
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan BreachAny Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan BreachCBIZ Risk & Advisory Services
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Michael C. Keeling, Esq.
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxcaniceconsulting
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftCBIZ, Inc.
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guideJoAnna Cheshire
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Don Grauel
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better CybersecurityShawn Tuma
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Lawguest8b10a3
 

Ähnlich wie Captive Insurance and Cyber Risk (20)

Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan BreachAny Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptx
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Cyber
Cyber Cyber
Cyber
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Law
 

Mehr von The Law Office of Hale Stewart (6)

An Introduction to Trusts
An Introduction to TrustsAn Introduction to Trusts
An Introduction to Trusts
 
Asset protection strategies, part 1
Asset protection strategies, part 1Asset protection strategies, part 1
Asset protection strategies, part 1
 
Tax treaties presentation
Tax treaties presentationTax treaties presentation
Tax treaties presentation
 
Asset protection 101
Asset protection 101Asset protection 101
Asset protection 101
 
Using Websites in International Tax Planning
Using Websites in International Tax PlanningUsing Websites in International Tax Planning
Using Websites in International Tax Planning
 
Captive Insurance Presentation
Captive Insurance PresentationCaptive Insurance Presentation
Captive Insurance Presentation
 

Kürzlich hochgeladen

FULL ENJOY - 8264348440 Call Girls in DLf Phase 4 | Gurgaon
FULL ENJOY - 8264348440 Call Girls in DLf Phase 4 | GurgaonFULL ENJOY - 8264348440 Call Girls in DLf Phase 4 | Gurgaon
FULL ENJOY - 8264348440 Call Girls in DLf Phase 4 | Gurgaonsoniya singh
 
Low Rate ↬Call Girls in Trilokpuri Delhi ↫8447779280}Escorts Service In Delhi
Low Rate ↬Call Girls in Trilokpuri Delhi ↫8447779280}Escorts Service In DelhiLow Rate ↬Call Girls in Trilokpuri Delhi ↫8447779280}Escorts Service In Delhi
Low Rate ↬Call Girls in Trilokpuri Delhi ↫8447779280}Escorts Service In Delhiasmaqueen5
 
Maha Mauka Squarefeet Brochure |Maha Mauka Squarefeet PDF Brochure|
Maha Mauka Squarefeet Brochure |Maha Mauka Squarefeet PDF Brochure|Maha Mauka Squarefeet Brochure |Maha Mauka Squarefeet PDF Brochure|
Maha Mauka Squarefeet Brochure |Maha Mauka Squarefeet PDF Brochure|AkshayJoshi575980
 
Pooja Mehta 9167673311 Get Warm Welcome By Andheri Escorts For Desired Fantasies
Pooja Mehta 9167673311 Get Warm Welcome By Andheri Escorts For Desired FantasiesPooja Mehta 9167673311 Get Warm Welcome By Andheri Escorts For Desired Fantasies
Pooja Mehta 9167673311 Get Warm Welcome By Andheri Escorts For Desired FantasiesPooja Nehwal
 
Kohinoor Hinjewadi Phase 2 Pune E-Brochure.pdf
Kohinoor Hinjewadi Phase 2 Pune  E-Brochure.pdfKohinoor Hinjewadi Phase 2 Pune  E-Brochure.pdf
Kohinoor Hinjewadi Phase 2 Pune E-Brochure.pdfManishSaxena95
 
Purva Soukhyam in Guduvancheri Chennai.pdf
Purva Soukhyam in Guduvancheri Chennai.pdfPurva Soukhyam in Guduvancheri Chennai.pdf
Purva Soukhyam in Guduvancheri Chennai.pdfpritika141199
 
Properties for Sale in Istanbul with Schools and Parks | Antalya Development
Properties for Sale in Istanbul with Schools and Parks | Antalya DevelopmentProperties for Sale in Istanbul with Schools and Parks | Antalya Development
Properties for Sale in Istanbul with Schools and Parks | Antalya DevelopmentAntalya Development
 
Mahindra Happinest Tathawade Pune Brochure.pdf
Mahindra Happinest Tathawade Pune Brochure.pdfMahindra Happinest Tathawade Pune Brochure.pdf
Mahindra Happinest Tathawade Pune Brochure.pdfBabyrudram
 
3D Architectural Rendering Company by Panoram CGI
3D Architectural Rendering Company by Panoram CGI3D Architectural Rendering Company by Panoram CGI
3D Architectural Rendering Company by Panoram CGIPanoram CGI
 
Raquel Thompson: Combining Creativity with Practicality in Architecture
Raquel Thompson: Combining  Creativity with Practicality in ArchitectureRaquel Thompson: Combining  Creativity with Practicality in Architecture
Raquel Thompson: Combining Creativity with Practicality in ArchitectureRaquel Thompson Barbados
 
M3M 129 E Brochure Noida Expressway, Sector 129, Noida
M3M 129 E Brochure Noida Expressway, Sector 129, NoidaM3M 129 E Brochure Noida Expressway, Sector 129, Noida
M3M 129 E Brochure Noida Expressway, Sector 129, Noidasarak0han45400
 
Call Girls in Noida Sector 12 Noida 💯Call Us 🔝 9582086666 🔝 South Delhi Escor...
Call Girls in Noida Sector 12 Noida 💯Call Us 🔝 9582086666 🔝 South Delhi Escor...Call Girls in Noida Sector 12 Noida 💯Call Us 🔝 9582086666 🔝 South Delhi Escor...
Call Girls in Noida Sector 12 Noida 💯Call Us 🔝 9582086666 🔝 South Delhi Escor...delhimodel235
 
Omaxe Dwarka In Delhi E Brochure Pdf
Omaxe Dwarka In Delhi E Brochure     PdfOmaxe Dwarka In Delhi E Brochure     Pdf
Omaxe Dwarka In Delhi E Brochure Pdfashiyadav24
 
Call Girls in Adarsh Nagar Delhi 💯Call Us 🔝 9582086666🔝 South Delhi Escorts S...
Call Girls in Adarsh Nagar Delhi 💯Call Us 🔝 9582086666🔝 South Delhi Escorts S...Call Girls in Adarsh Nagar Delhi 💯Call Us 🔝 9582086666🔝 South Delhi Escorts S...
Call Girls in Adarsh Nagar Delhi 💯Call Us 🔝 9582086666🔝 South Delhi Escorts S...delhimodel235
 
:/Call Girls In Saidulajab Delhi ➥9990211544 High profile Riya Escorts In 24/...
:/Call Girls In Saidulajab Delhi ➥9990211544 High profile Riya Escorts In 24/...:/Call Girls In Saidulajab Delhi ➥9990211544 High profile Riya Escorts In 24/...
:/Call Girls In Saidulajab Delhi ➥9990211544 High profile Riya Escorts In 24/...lizamodels9
 
Sankla East World Hadapsar Pune E-Brochure.pdf
Sankla East World Hadapsar Pune  E-Brochure.pdfSankla East World Hadapsar Pune  E-Brochure.pdf
Sankla East World Hadapsar Pune E-Brochure.pdfManishSaxena95
 
Puravankara Mundhwa Pune E-Brochure.pdf
Puravankara Mundhwa Pune  E-Brochure.pdfPuravankara Mundhwa Pune  E-Brochure.pdf
Puravankara Mundhwa Pune E-Brochure.pdfManishSaxena95
 
call girls in ganesh nagar Delhi 8264348440 ✅ call girls ❤️
call girls in ganesh nagar Delhi 8264348440 ✅ call girls ❤️call girls in ganesh nagar Delhi 8264348440 ✅ call girls ❤️
call girls in ganesh nagar Delhi 8264348440 ✅ call girls ❤️soniya singh
 
TENANT SCREENING REPORT SERVICES​ How Tenant Screening Reports Work
TENANT SCREENING REPORT SERVICES​ How Tenant Screening Reports WorkTENANT SCREENING REPORT SERVICES​ How Tenant Screening Reports Work
TENANT SCREENING REPORT SERVICES​ How Tenant Screening Reports WorkTurbo Tenant
 
9990771857 Call Girls in Dwarka Sector 6 Delhi (Call Girls) Delhi
9990771857 Call Girls in Dwarka Sector 6 Delhi (Call Girls) Delhi9990771857 Call Girls in Dwarka Sector 6 Delhi (Call Girls) Delhi
9990771857 Call Girls in Dwarka Sector 6 Delhi (Call Girls) Delhidelhimodel235
 

Kürzlich hochgeladen (20)

FULL ENJOY - 8264348440 Call Girls in DLf Phase 4 | Gurgaon
FULL ENJOY - 8264348440 Call Girls in DLf Phase 4 | GurgaonFULL ENJOY - 8264348440 Call Girls in DLf Phase 4 | Gurgaon
FULL ENJOY - 8264348440 Call Girls in DLf Phase 4 | Gurgaon
 
Low Rate ↬Call Girls in Trilokpuri Delhi ↫8447779280}Escorts Service In Delhi
Low Rate ↬Call Girls in Trilokpuri Delhi ↫8447779280}Escorts Service In DelhiLow Rate ↬Call Girls in Trilokpuri Delhi ↫8447779280}Escorts Service In Delhi
Low Rate ↬Call Girls in Trilokpuri Delhi ↫8447779280}Escorts Service In Delhi
 
Maha Mauka Squarefeet Brochure |Maha Mauka Squarefeet PDF Brochure|
Maha Mauka Squarefeet Brochure |Maha Mauka Squarefeet PDF Brochure|Maha Mauka Squarefeet Brochure |Maha Mauka Squarefeet PDF Brochure|
Maha Mauka Squarefeet Brochure |Maha Mauka Squarefeet PDF Brochure|
 
Pooja Mehta 9167673311 Get Warm Welcome By Andheri Escorts For Desired Fantasies
Pooja Mehta 9167673311 Get Warm Welcome By Andheri Escorts For Desired FantasiesPooja Mehta 9167673311 Get Warm Welcome By Andheri Escorts For Desired Fantasies
Pooja Mehta 9167673311 Get Warm Welcome By Andheri Escorts For Desired Fantasies
 
Kohinoor Hinjewadi Phase 2 Pune E-Brochure.pdf
Kohinoor Hinjewadi Phase 2 Pune  E-Brochure.pdfKohinoor Hinjewadi Phase 2 Pune  E-Brochure.pdf
Kohinoor Hinjewadi Phase 2 Pune E-Brochure.pdf
 
Purva Soukhyam in Guduvancheri Chennai.pdf
Purva Soukhyam in Guduvancheri Chennai.pdfPurva Soukhyam in Guduvancheri Chennai.pdf
Purva Soukhyam in Guduvancheri Chennai.pdf
 
Properties for Sale in Istanbul with Schools and Parks | Antalya Development
Properties for Sale in Istanbul with Schools and Parks | Antalya DevelopmentProperties for Sale in Istanbul with Schools and Parks | Antalya Development
Properties for Sale in Istanbul with Schools and Parks | Antalya Development
 
Mahindra Happinest Tathawade Pune Brochure.pdf
Mahindra Happinest Tathawade Pune Brochure.pdfMahindra Happinest Tathawade Pune Brochure.pdf
Mahindra Happinest Tathawade Pune Brochure.pdf
 
3D Architectural Rendering Company by Panoram CGI
3D Architectural Rendering Company by Panoram CGI3D Architectural Rendering Company by Panoram CGI
3D Architectural Rendering Company by Panoram CGI
 
Raquel Thompson: Combining Creativity with Practicality in Architecture
Raquel Thompson: Combining  Creativity with Practicality in ArchitectureRaquel Thompson: Combining  Creativity with Practicality in Architecture
Raquel Thompson: Combining Creativity with Practicality in Architecture
 
M3M 129 E Brochure Noida Expressway, Sector 129, Noida
M3M 129 E Brochure Noida Expressway, Sector 129, NoidaM3M 129 E Brochure Noida Expressway, Sector 129, Noida
M3M 129 E Brochure Noida Expressway, Sector 129, Noida
 
Call Girls in Noida Sector 12 Noida 💯Call Us 🔝 9582086666 🔝 South Delhi Escor...
Call Girls in Noida Sector 12 Noida 💯Call Us 🔝 9582086666 🔝 South Delhi Escor...Call Girls in Noida Sector 12 Noida 💯Call Us 🔝 9582086666 🔝 South Delhi Escor...
Call Girls in Noida Sector 12 Noida 💯Call Us 🔝 9582086666 🔝 South Delhi Escor...
 
Omaxe Dwarka In Delhi E Brochure Pdf
Omaxe Dwarka In Delhi E Brochure     PdfOmaxe Dwarka In Delhi E Brochure     Pdf
Omaxe Dwarka In Delhi E Brochure Pdf
 
Call Girls in Adarsh Nagar Delhi 💯Call Us 🔝 9582086666🔝 South Delhi Escorts S...
Call Girls in Adarsh Nagar Delhi 💯Call Us 🔝 9582086666🔝 South Delhi Escorts S...Call Girls in Adarsh Nagar Delhi 💯Call Us 🔝 9582086666🔝 South Delhi Escorts S...
Call Girls in Adarsh Nagar Delhi 💯Call Us 🔝 9582086666🔝 South Delhi Escorts S...
 
:/Call Girls In Saidulajab Delhi ➥9990211544 High profile Riya Escorts In 24/...
:/Call Girls In Saidulajab Delhi ➥9990211544 High profile Riya Escorts In 24/...:/Call Girls In Saidulajab Delhi ➥9990211544 High profile Riya Escorts In 24/...
:/Call Girls In Saidulajab Delhi ➥9990211544 High profile Riya Escorts In 24/...
 
Sankla East World Hadapsar Pune E-Brochure.pdf
Sankla East World Hadapsar Pune  E-Brochure.pdfSankla East World Hadapsar Pune  E-Brochure.pdf
Sankla East World Hadapsar Pune E-Brochure.pdf
 
Puravankara Mundhwa Pune E-Brochure.pdf
Puravankara Mundhwa Pune  E-Brochure.pdfPuravankara Mundhwa Pune  E-Brochure.pdf
Puravankara Mundhwa Pune E-Brochure.pdf
 
call girls in ganesh nagar Delhi 8264348440 ✅ call girls ❤️
call girls in ganesh nagar Delhi 8264348440 ✅ call girls ❤️call girls in ganesh nagar Delhi 8264348440 ✅ call girls ❤️
call girls in ganesh nagar Delhi 8264348440 ✅ call girls ❤️
 
TENANT SCREENING REPORT SERVICES​ How Tenant Screening Reports Work
TENANT SCREENING REPORT SERVICES​ How Tenant Screening Reports WorkTENANT SCREENING REPORT SERVICES​ How Tenant Screening Reports Work
TENANT SCREENING REPORT SERVICES​ How Tenant Screening Reports Work
 
9990771857 Call Girls in Dwarka Sector 6 Delhi (Call Girls) Delhi
9990771857 Call Girls in Dwarka Sector 6 Delhi (Call Girls) Delhi9990771857 Call Girls in Dwarka Sector 6 Delhi (Call Girls) Delhi
9990771857 Call Girls in Dwarka Sector 6 Delhi (Call Girls) Delhi
 

Captive Insurance and Cyber Risk

  • 1. Cyber Exposures: Risks Well-Suited for Captive Insurers Jean Lamfers, Esq. Author of Cyber Insurance Policies, Consultant to National & International Insurers and Partner with the Law Firm of Lamfers, Sheehan & Ozegovic, LLC WeSimplifyLaw.com and Lsolaw.com 913-962-8200
  • 2. Why Is Cyber Exposure a Concern for My Business?  Because virtually all businesses access or store confidential information.  Because employees and independent contractors DO make mistakes in how they handle private information.  Because the employer is responsible for the acts of their employees.  Because federal and state laws, in response to constituents’ demands, have evolved into essentially “strict liability” for privacy breaches.
  • 3. Examples of Common, Recent Incidents  Theft of Mobile Devices ◦ A county-owned laptop was stolen from a Las Vegas hotel room with 35,000 county residents’ personal information ◦ Info came from Dept of Motor Vehicles included social security numbers & drivers’ license numbers ◦ The good news: The device was password protected. ◦ The bad news: Regardless of password protection, the county had to notify potentially affected residents and take other remedial actions.
  • 4. Examples of Common, Recent Incidents  Security Companies Are Breached ◦ RSA, known for their patented, second-layer password protection system, was secretly sabotaged for an extended time period ◦ The system uses keychain fobs, which receive & display numerical sequences updated approx. every 60 seconds ◦ Users enter the displayed sequence from the fob within a given time as a secondary password protection to access their company’s computers remotely ◦ The system was in use by many high- security industries and the government
  • 5. Examples of Common, Recent Incidents  Paper Data Breaches Are Common ◦ A billing service for 4 hospitals in MA improperly “recycled” 3 years of patient records at a recycling transfer station ◦ A newspaper employee witnessed the “disposal” and retrieved samples ◦ The result: a public relations nightmare and overwhelming notification/audit process
  • 6. Examples of Common, Recent Incidents  Rogue Employees ◦ During an investigation of an employee’s own residential burglary, police found more than they expected ◦ A Thomson CompuMark Data employee was implicated after police collected info suggesting the employee had removed paper records with customer payment card info from his employer ◦ These types of incidents occur with hair- raising frequency in the restaurant, hotel, retail and nearly-every, consumer-related industry.
  • 7. Costs and Outcomes Can Be Extraordinary  Florida Attorney General settled with a check services company for $850,000 for its investigative costs and attorney’s fees plus $125,000 contribution to an educational crime prevention program. A former employee stole the personal data. (He’s serving nearly 5 years in federal prison.)  State and federal regulators are using high profile incidents with sizeable awards or settlements as examples to spur prevention and curb knowing violations.
  • 8. What Does Cyber Insurance Cover? Damages claims by third parties for network security breaches Costs incurred to notify persons impacted by a data breach Regulatory fines imposed by governments Costs to restore data lost or compromised Investigation costs for computer forensic analysis
  • 9. What Does Cyber Insurance Cover? Crisis management costs--public relations and damage control Coverage for losses to or caused by data that’s maintained by a third party on your company’s behalf Coverage for “gaps” in typical general liability policies for claims arising out of the creation and distribution of content on websites, blogs, or social media
  • 10. Why Choose a Captive for Cyber Risks?  Captives can deliver cyber insurance uniquely tailored for your business.  You and your program developer decide what risks to insure.  Risk management and risk audits can improve your bottom line.  Top-Down implementation is more successful, which the captive structure inherently encourages.
  • 11. The Law Firm of Lamfers, Sheehan & Ozegovic, LLC  Relevant experience writing cyber insurance and errors and omissions insurance policies for well- known companies  Extensive claims management experience in niche markets of technology, media, cyber and privacy  Ability to deliver risk management and ongoing product support without the large firm overhead.  Insurance industry contacts for successful placement of any requisite reinsurance.
  • 12. Cyber Exposures: Risks Well-Suited for Captive Insurers Jean Lamfers, Esq. Author of Cyber Insurance Policies, Consultant to National & International Insurers and Partner with the Law Firm of Lamfers, Sheehan & Ozegovic, LLC 6333 Long Avenue, Suite 102 Shawnee, Kansas 66216 WeSimplifyLaw.com and Lsolaw.com 913-962-8200 jl@lamferslaw.com