SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
EASILY
DIGESTIBLE
DIGITAL
INSIGHT
#digitalbites @digital_bites
Do you really need cyber
liability insurance?
•  Quick introduction
•  What is Cyber Liability risk?
•  Some well known cases
•  How would Cyber Liability have helped?
•  Who is at risk?
•  How can you stop it and other thoughts?
10 minutes Bite Sized explanation
Risk
Risk Management
I have
peace of
mind
Risk Management and Insurance
Your Risks:
•  Cyber Loss or Damage
•  Business Interruption or Extra Expenses
•  Cyber Theft
•  Cyber Extortion
What is cyber liability insurance?
The highlights from this incident:
•  Complete crash of RBS, NatWest & Ulster Bank’s payment system
for four days;
•  Complete failure to register payments;
•  Bank extended hours at 1,200 branches;
•  Compensation agreed for any/all who suffered financial loss;
•  Expected final settlement over £170,000,000
“Failed Automated Software” RBS/NatWest June 2012
Your risk from others:
•  Cyber Media Liability
•  Privacy Liability
•  Cyber Security Liability
•  Breach of confidentiality
What is cyber liability insurance?
The highlights from this incident are as follows:
•  Two separate data breaches in April and May 2011 lead to over 100
million individuals details "exposed";
•  12 million credit and debit cards compromised;
•  Estimated to spend US$180,000,000 just on these breach related
costs; and
•  UK Information Commissioners Office fined them £250,000 in
January 2013 for "preventable data breach".
“Sony Playstation suffers massive breaches” April 2011
Any company that stores, manipulates,
or transmits data is at risk of a cyber
or physical theft event
Who is really at risk?
•  Cyber policies cover businesses whether they are
negligent or not (so no need to have been negligent).
•  Physical loss of data account for 45% of losses – lost
laptops and data sticks.
•  There were 855 data breaches reported in 2011.
A few more thoughts
•  Some insurers immediately provide PR support – often
the first issue.
•  There are 5 leading insurers.
•  Costs:
Below £1m t/o company: £500k limit, premium £1,802
£5m t/o company: £1m limit, premium £4,452
A few more thoughts
•  You can’t – Sony couldn’t – if people are determined…
•  Risk management: Better firewalls, policies to control
staff, continuity plans or not use the internet…
•  If it’s news, then it’s on Twitter, and before you know,
everyone else does…
How can you stop it?
•  Mistakes do happen – we have seen lots of well known
cases now.
•  Botnet attacked Wordpress two weeks ago, whilst I
was writing this presentation.
•  There is a word called “Hackivism”.
How can you stop it?
Happy to take any questions
Questions
Contact:
Website: www.poundgates.com
My e-mail: rob.thacker@poundgates.com
Direct line: 01473 346019
Thank you
  Next Digital Bites – 23rd May
  Would you like to be a speaker?
  Subscribe to the Crafted Edition
  Follow @craftedmedia

Contenu connexe

Tendances

Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Dan Michaluk
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rulessaurnou
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewOCTF Industry Engagement
 
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Sean Bradley
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessLucy Denver
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...PECB
 
Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?Napier University
 
Torbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security ClusterTorbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security ClusterPeter Jones
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesNapier University
 
ICANN Contract vs National Law
ICANN Contract vs National LawICANN Contract vs National Law
ICANN Contract vs National LawBlacknight
 
Looking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsLooking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsResilient Systems
 
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Jim Brashear
 
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Chris Hails
 
Nelson&ward cyber presentation
Nelson&ward cyber presentationNelson&ward cyber presentation
Nelson&ward cyber presentationKatherineLobdell
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Ontario Cloud SIG
 
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your MindBrian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mindcentralohioissa
 

Tendances (20)

Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016
 
10 reasons businesses fail!
10 reasons businesses fail!10 reasons businesses fail!
10 reasons businesses fail!
 
Primeshare overview -_jun_2013-1
Primeshare overview -_jun_2013-1Primeshare overview -_jun_2013-1
Primeshare overview -_jun_2013-1
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
 
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"
 
Mbs r35 b
Mbs r35 bMbs r35 b
Mbs r35 b
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?
 
Torbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security ClusterTorbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security Cluster
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The Challenges
 
ICANN Contract vs National Law
ICANN Contract vs National LawICANN Contract vs National Law
ICANN Contract vs National Law
 
Looking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsLooking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data Incidents
 
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
 
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
 
Nelson&ward cyber presentation
Nelson&ward cyber presentationNelson&ward cyber presentation
Nelson&ward cyber presentation
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
 
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your MindBrian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
 

Similaire à Do I really need cyber liability insurance?

CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?Xtandit_Marketing
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-securityStephen Cobb
 
CPA firm Cyber Insurance Specifics
CPA firm Cyber Insurance SpecificsCPA firm Cyber Insurance Specifics
CPA firm Cyber Insurance SpecificsJoseph Brunsman
 
The CPAs Guide to Buying Cyber Insurance
The CPAs Guide to Buying Cyber InsuranceThe CPAs Guide to Buying Cyber Insurance
The CPAs Guide to Buying Cyber InsuranceJoseph Brunsman
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxPREMTRIVEDI5
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxjaved75
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxMalikMumtaz6
 
Cyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfCyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfBalaMurali958529
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018Human Capital Department
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...James Fisher
 
5 Myths of Cybersecurity That are Important to You and Your Job
5 Myths of Cybersecurity That are Important to You and Your Job5 Myths of Cybersecurity That are Important to You and Your Job
5 Myths of Cybersecurity That are Important to You and Your JobEvolver Inc.
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyJames Mulhern
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraudtomciolkosz
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!tomciolkosz
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxSPMTPCAMPUS
 

Similaire à Do I really need cyber liability insurance? (20)

CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
CPA firm Cyber Insurance Specifics
CPA firm Cyber Insurance SpecificsCPA firm Cyber Insurance Specifics
CPA firm Cyber Insurance Specifics
 
The CPAs Guide to Buying Cyber Insurance
The CPAs Guide to Buying Cyber InsuranceThe CPAs Guide to Buying Cyber Insurance
The CPAs Guide to Buying Cyber Insurance
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptx
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfCyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdf
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
 
awareness.pdf
awareness.pdfawareness.pdf
awareness.pdf
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
5 Myths of Cybersecurity That are Important to You and Your Job
5 Myths of Cybersecurity That are Important to You and Your Job5 Myths of Cybersecurity That are Important to You and Your Job
5 Myths of Cybersecurity That are Important to You and Your Job
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
cybersec-01.pptx
cybersec-01.pptxcybersec-01.pptx
cybersec-01.pptx
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptx
 

Plus de Crafted

How to build your brand through digital marketing - Visit Essex Conference 2017
How to build your brand through digital marketing - Visit Essex Conference 2017How to build your brand through digital marketing - Visit Essex Conference 2017
How to build your brand through digital marketing - Visit Essex Conference 2017Crafted
 
VAC16 - The Future of Search for Attractions
VAC16 - The Future of Search for AttractionsVAC16 - The Future of Search for Attractions
VAC16 - The Future of Search for AttractionsCrafted
 
Trading channel data for campaign success brighton seo
Trading channel data for campaign success brighton seoTrading channel data for campaign success brighton seo
Trading channel data for campaign success brighton seoCrafted
 
The future of Google and what this means for hotel marketers - Crafted at the...
The future of Google and what this means for hotel marketers - Crafted at the...The future of Google and what this means for hotel marketers - Crafted at the...
The future of Google and what this means for hotel marketers - Crafted at the...Crafted
 
BrightonSEO: Context is King - Ian Miller, CEO, at Crafted
BrightonSEO: Context is King - Ian Miller, CEO, at Crafted BrightonSEO: Context is King - Ian Miller, CEO, at Crafted
BrightonSEO: Context is King - Ian Miller, CEO, at Crafted Crafted
 
A review of 2014's digital marketing milestones & 2015's online marketing pre...
A review of 2014's digital marketing milestones & 2015's online marketing pre...A review of 2014's digital marketing milestones & 2015's online marketing pre...
A review of 2014's digital marketing milestones & 2015's online marketing pre...Crafted
 
Competitor and consumer intelligence in the digital age: Drive Digital talk b...
Competitor and consumer intelligence in the digital age: Drive Digital talk b...Competitor and consumer intelligence in the digital age: Drive Digital talk b...
Competitor and consumer intelligence in the digital age: Drive Digital talk b...Crafted
 
Predicting the future of Google - BrightonSEO
Predicting the future of Google - BrightonSEOPredicting the future of Google - BrightonSEO
Predicting the future of Google - BrightonSEOCrafted
 
The importance of digital marketing: a retail perspective - EoE Co-op's Oli W...
The importance of digital marketing: a retail perspective - EoE Co-op's Oli W...The importance of digital marketing: a retail perspective - EoE Co-op's Oli W...
The importance of digital marketing: a retail perspective - EoE Co-op's Oli W...Crafted
 
Is Google taking over the world? by Crafted's Ian Miller at Digital Bites
Is Google taking over the world? by Crafted's Ian Miller at Digital BitesIs Google taking over the world? by Crafted's Ian Miller at Digital Bites
Is Google taking over the world? by Crafted's Ian Miller at Digital BitesCrafted
 
How to create a content marketing strategy - Drive Digital
How to create a content marketing strategy - Drive Digital How to create a content marketing strategy - Drive Digital
How to create a content marketing strategy - Drive Digital Crafted
 
The three things you must know to succeed on social media
The three things you must know to succeed on social mediaThe three things you must know to succeed on social media
The three things you must know to succeed on social mediaCrafted
 
How to create a content marketing strategy
How to create a content marketing strategyHow to create a content marketing strategy
How to create a content marketing strategyCrafted
 
Going the distance: achieving your goals in marketing, business and life Tom...
Going the distance: achieving your goals in marketing, business and life  Tom...Going the distance: achieving your goals in marketing, business and life  Tom...
Going the distance: achieving your goals in marketing, business and life Tom...Crafted
 
Do something digital in 2014 - Digital Bites February 2014
Do something digital in 2014 - Digital Bites February 2014Do something digital in 2014 - Digital Bites February 2014
Do something digital in 2014 - Digital Bites February 2014Crafted
 
Essential digital marketing trends for 2014
Essential digital marketing trends for 2014Essential digital marketing trends for 2014
Essential digital marketing trends for 2014Crafted
 
2013: A review of the year in digital marketing
2013: A review of the year in digital marketing 2013: A review of the year in digital marketing
2013: A review of the year in digital marketing Crafted
 
User experience and SEO: Is your website losing you customers? Chelmsford Cit...
User experience and SEO: Is your website losing you customers? Chelmsford Cit...User experience and SEO: Is your website losing you customers? Chelmsford Cit...
User experience and SEO: Is your website losing you customers? Chelmsford Cit...Crafted
 
How to grow your twitter following on the cheep!
How to grow your twitter following on the cheep!How to grow your twitter following on the cheep!
How to grow your twitter following on the cheep!Crafted
 
How to make your website launch really take off
How to make your website launch really take offHow to make your website launch really take off
How to make your website launch really take offCrafted
 

Plus de Crafted (20)

How to build your brand through digital marketing - Visit Essex Conference 2017
How to build your brand through digital marketing - Visit Essex Conference 2017How to build your brand through digital marketing - Visit Essex Conference 2017
How to build your brand through digital marketing - Visit Essex Conference 2017
 
VAC16 - The Future of Search for Attractions
VAC16 - The Future of Search for AttractionsVAC16 - The Future of Search for Attractions
VAC16 - The Future of Search for Attractions
 
Trading channel data for campaign success brighton seo
Trading channel data for campaign success brighton seoTrading channel data for campaign success brighton seo
Trading channel data for campaign success brighton seo
 
The future of Google and what this means for hotel marketers - Crafted at the...
The future of Google and what this means for hotel marketers - Crafted at the...The future of Google and what this means for hotel marketers - Crafted at the...
The future of Google and what this means for hotel marketers - Crafted at the...
 
BrightonSEO: Context is King - Ian Miller, CEO, at Crafted
BrightonSEO: Context is King - Ian Miller, CEO, at Crafted BrightonSEO: Context is King - Ian Miller, CEO, at Crafted
BrightonSEO: Context is King - Ian Miller, CEO, at Crafted
 
A review of 2014's digital marketing milestones & 2015's online marketing pre...
A review of 2014's digital marketing milestones & 2015's online marketing pre...A review of 2014's digital marketing milestones & 2015's online marketing pre...
A review of 2014's digital marketing milestones & 2015's online marketing pre...
 
Competitor and consumer intelligence in the digital age: Drive Digital talk b...
Competitor and consumer intelligence in the digital age: Drive Digital talk b...Competitor and consumer intelligence in the digital age: Drive Digital talk b...
Competitor and consumer intelligence in the digital age: Drive Digital talk b...
 
Predicting the future of Google - BrightonSEO
Predicting the future of Google - BrightonSEOPredicting the future of Google - BrightonSEO
Predicting the future of Google - BrightonSEO
 
The importance of digital marketing: a retail perspective - EoE Co-op's Oli W...
The importance of digital marketing: a retail perspective - EoE Co-op's Oli W...The importance of digital marketing: a retail perspective - EoE Co-op's Oli W...
The importance of digital marketing: a retail perspective - EoE Co-op's Oli W...
 
Is Google taking over the world? by Crafted's Ian Miller at Digital Bites
Is Google taking over the world? by Crafted's Ian Miller at Digital BitesIs Google taking over the world? by Crafted's Ian Miller at Digital Bites
Is Google taking over the world? by Crafted's Ian Miller at Digital Bites
 
How to create a content marketing strategy - Drive Digital
How to create a content marketing strategy - Drive Digital How to create a content marketing strategy - Drive Digital
How to create a content marketing strategy - Drive Digital
 
The three things you must know to succeed on social media
The three things you must know to succeed on social mediaThe three things you must know to succeed on social media
The three things you must know to succeed on social media
 
How to create a content marketing strategy
How to create a content marketing strategyHow to create a content marketing strategy
How to create a content marketing strategy
 
Going the distance: achieving your goals in marketing, business and life Tom...
Going the distance: achieving your goals in marketing, business and life  Tom...Going the distance: achieving your goals in marketing, business and life  Tom...
Going the distance: achieving your goals in marketing, business and life Tom...
 
Do something digital in 2014 - Digital Bites February 2014
Do something digital in 2014 - Digital Bites February 2014Do something digital in 2014 - Digital Bites February 2014
Do something digital in 2014 - Digital Bites February 2014
 
Essential digital marketing trends for 2014
Essential digital marketing trends for 2014Essential digital marketing trends for 2014
Essential digital marketing trends for 2014
 
2013: A review of the year in digital marketing
2013: A review of the year in digital marketing 2013: A review of the year in digital marketing
2013: A review of the year in digital marketing
 
User experience and SEO: Is your website losing you customers? Chelmsford Cit...
User experience and SEO: Is your website losing you customers? Chelmsford Cit...User experience and SEO: Is your website losing you customers? Chelmsford Cit...
User experience and SEO: Is your website losing you customers? Chelmsford Cit...
 
How to grow your twitter following on the cheep!
How to grow your twitter following on the cheep!How to grow your twitter following on the cheep!
How to grow your twitter following on the cheep!
 
How to make your website launch really take off
How to make your website launch really take offHow to make your website launch really take off
How to make your website launch really take off
 

Dernier

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Dernier (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Do I really need cyber liability insurance?

  • 2. Do you really need cyber liability insurance?
  • 3. •  Quick introduction •  What is Cyber Liability risk? •  Some well known cases •  How would Cyber Liability have helped? •  Who is at risk? •  How can you stop it and other thoughts? 10 minutes Bite Sized explanation
  • 4.
  • 7. I have peace of mind Risk Management and Insurance
  • 8. Your Risks: •  Cyber Loss or Damage •  Business Interruption or Extra Expenses •  Cyber Theft •  Cyber Extortion What is cyber liability insurance?
  • 9. The highlights from this incident: •  Complete crash of RBS, NatWest & Ulster Bank’s payment system for four days; •  Complete failure to register payments; •  Bank extended hours at 1,200 branches; •  Compensation agreed for any/all who suffered financial loss; •  Expected final settlement over £170,000,000 “Failed Automated Software” RBS/NatWest June 2012
  • 10. Your risk from others: •  Cyber Media Liability •  Privacy Liability •  Cyber Security Liability •  Breach of confidentiality What is cyber liability insurance?
  • 11. The highlights from this incident are as follows: •  Two separate data breaches in April and May 2011 lead to over 100 million individuals details "exposed"; •  12 million credit and debit cards compromised; •  Estimated to spend US$180,000,000 just on these breach related costs; and •  UK Information Commissioners Office fined them £250,000 in January 2013 for "preventable data breach". “Sony Playstation suffers massive breaches” April 2011
  • 12. Any company that stores, manipulates, or transmits data is at risk of a cyber or physical theft event Who is really at risk?
  • 13. •  Cyber policies cover businesses whether they are negligent or not (so no need to have been negligent). •  Physical loss of data account for 45% of losses – lost laptops and data sticks. •  There were 855 data breaches reported in 2011. A few more thoughts
  • 14. •  Some insurers immediately provide PR support – often the first issue. •  There are 5 leading insurers. •  Costs: Below £1m t/o company: £500k limit, premium £1,802 £5m t/o company: £1m limit, premium £4,452 A few more thoughts
  • 15. •  You can’t – Sony couldn’t – if people are determined… •  Risk management: Better firewalls, policies to control staff, continuity plans or not use the internet… •  If it’s news, then it’s on Twitter, and before you know, everyone else does… How can you stop it?
  • 16. •  Mistakes do happen – we have seen lots of well known cases now. •  Botnet attacked Wordpress two weeks ago, whilst I was writing this presentation. •  There is a word called “Hackivism”. How can you stop it?
  • 17. Happy to take any questions Questions
  • 18. Contact: Website: www.poundgates.com My e-mail: rob.thacker@poundgates.com Direct line: 01473 346019
  • 19. Thank you   Next Digital Bites – 23rd May   Would you like to be a speaker?   Subscribe to the Crafted Edition   Follow @craftedmedia