welcome [sbdc.mt.gov]

47
Welcome Cyber Risk is Real Continuity Planning Dena Johnson, MBA, EDFP [email protected] (406) 238 1992 Chantel Sparovic [email protected] (406) 238 1913 Richard Stone, Cyber Underwriter Travelers Insurance

Upload: others

Post on 28-Feb-2022

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Welcome [sbdc.mt.gov]

Welcome Cyber Risk is Real

Continuity Planning

Dena Johnson, MBA, EDFP [email protected](406) 238 1992

Chantel [email protected](406) 238 1913

Richard Stone, Cyber Underwriter

Travelers Insurance

Page 2: Welcome [sbdc.mt.gov]

Thank you to our host & sponsor!

Page 3: Welcome [sbdc.mt.gov]

Cyber-crime

Cyber risk – exposures

Cyber mitigation

Incident response team/plan

Incident recovery

Page 4: Welcome [sbdc.mt.gov]

Small Businesses need protection

Page 5: Welcome [sbdc.mt.gov]

Doing business looks different…

Page 6: Welcome [sbdc.mt.gov]

What is cyber-crime?

Page 7: Welcome [sbdc.mt.gov]
Page 8: Welcome [sbdc.mt.gov]

Types of cyber-crime

Page 9: Welcome [sbdc.mt.gov]
Page 10: Welcome [sbdc.mt.gov]

PHISHING

Page 11: Welcome [sbdc.mt.gov]

PHISHING

Page 12: Welcome [sbdc.mt.gov]

VISHING

Page 13: Welcome [sbdc.mt.gov]

SMISHING

Page 14: Welcome [sbdc.mt.gov]

Suppliers | Customers

Page 15: Welcome [sbdc.mt.gov]

Unintentional & Intentional employee disclosure

Page 16: Welcome [sbdc.mt.gov]

Point of Sale

Page 17: Welcome [sbdc.mt.gov]

Bring your own device (BYOD)

Page 18: Welcome [sbdc.mt.gov]

Website risk

Page 19: Welcome [sbdc.mt.gov]

Cyber-attacks are real

Page 20: Welcome [sbdc.mt.gov]
Page 21: Welcome [sbdc.mt.gov]

Work-anywhere – is normal (no longer new)

Page 22: Welcome [sbdc.mt.gov]

Liabilities to third parties:

• Employees, vendors, suppliers, public arising out of breach of information or pass-through malware

• Media Liability

Legal Defense and Investigation

• Costs incurred to defend claims or research obligations under laws of multiple jurisdictions

Forensics

• Source of breach/loss, confirmation of quarantine or disposal

Regulatory Fines and Defense

• HIPAA, GDPR, CCPA, state statutes

Ransomware

• Cost of ransom, forensics, or data restoration

Physical Damage

• Cost to replace servers and other computer equipment

Data Restoration

• Cost to recover, retrieve or reinstate data lost as result of breach

Business Interruption/Expense to resume pre-breach operations

• Loss of business while operations suspended or impaired due to breach

Reputational Damage

• Loss of business due to public perception of data security

• Public Relations & Crisis Management

Other/Emerging

• Funds transfer type frauds – Social engineering or invoice manipulation

• Bodily Injury or Property Damage

“The Unknown”

• aka Silent Cyber

Exposures

Page 23: Welcome [sbdc.mt.gov]
Page 24: Welcome [sbdc.mt.gov]

What is cyber-security?

Page 25: Welcome [sbdc.mt.gov]

Types of Cyber-security – humans!

Page 26: Welcome [sbdc.mt.gov]

Education & Training

Page 27: Welcome [sbdc.mt.gov]

Education & Training

Page 28: Welcome [sbdc.mt.gov]

What is MFA or 2FA?

Page 29: Welcome [sbdc.mt.gov]
Page 30: Welcome [sbdc.mt.gov]
Page 31: Welcome [sbdc.mt.gov]
Page 32: Welcome [sbdc.mt.gov]

MFA Example

Page 33: Welcome [sbdc.mt.gov]
Page 34: Welcome [sbdc.mt.gov]
Page 35: Welcome [sbdc.mt.gov]

Encryption = Protection

Page 36: Welcome [sbdc.mt.gov]
Page 37: Welcome [sbdc.mt.gov]

Cloud

Page 38: Welcome [sbdc.mt.gov]

Anti-virus software

Page 39: Welcome [sbdc.mt.gov]
Page 40: Welcome [sbdc.mt.gov]

What is Cyber Insurance?

Page 41: Welcome [sbdc.mt.gov]

INCIDENT RESPONSE TEAM

COMPUTER FORENSICS LEGAL ACCOUNTING

A forensic IT team assesses the damage tod etermine what was compromised. How did they get

access? Can we get it back?

Notification costs, regualtory compliance, negotiations with

ransom demand

Quantify the loss in revenue

BREACH COACH

Page 42: Welcome [sbdc.mt.gov]

INCIDENT RESPONSE TEAM

CREDIT MONITORING DATA RECOVERY FIRM PUBLIC RELATIONS

IT experts to get your systems back up and running after you

get the encryption key

Manage professional communications (damage

control) related to the incident

Page 43: Welcome [sbdc.mt.gov]

STATE OF THE CYBER MARKET

PREMIUMS DEDUCTIBLES NEW MARKETS CONTROLS

Upward pressure on premiums. Typically see 5% - 30% increases on

renewals.

First time we’ve seen deductibles increasing without an option to buy the deductible

down

new carriers enteringthis market has slowed

down. Lots of new players in the Cyber Insurance Space.

Strict Ransomware applications requiring

certain controls including dual authentication.

Scanning networks for weakness as part of the

underwriting process

TRENDS

Page 44: Welcome [sbdc.mt.gov]

CONTRACT LANGUAGE

NEW CYBER REQUIREMENTS

» DATA SECURITY: Contractor has developed and implemented a comprehensive information security

program that includes controls to ensure security of Data (firewalls, anti-virus software, two-

factor authentication, awareness training)

» INFORMATION SECURITY TRAINING: Contractors with electronic access to any network or information

system owned by the Owner/GC. Only authorized and trained persons

» SECURITY INCIDENT RESPONSE PLAN: Contractor shall develop and implement a “response plan”,

which shall be policies and procedures to address Security Incidents.

» NOTIFICATION: Any unauthorized use or access, penetration, or security breach must be

reported and Contractor shall be required to remedy and mitigate any damages, losses, or

expenses caused by a breach in the Contractors security systems.

» CYBER LIABILITY: Contractor shall carry a Cyber Liability Policy with limits of not less than

$1,000,000. Coverage must include a Cyber Deception Fraud limit of at least $100,000

Page 45: Welcome [sbdc.mt.gov]

Cyber security S W O T (audit)

Page 46: Welcome [sbdc.mt.gov]

No magic bubble

Page 47: Welcome [sbdc.mt.gov]

THANK YOUQuestions?

Dena Johnson, MBA, EDFP [email protected](406) 238 1992

Chantel [email protected](406) 238 1913

Richard Stone, Cyber Underwriter

Travelers Insurance