SlideShare une entreprise Scribd logo
1  sur  41
Télécharger pour lire hors ligne
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
Cyber Risk for the Construction Industry
Date: 20 September 2018
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
2
Agenda
1. Cyber Exposures in the Construction Industry
2. Overview of Cyber Insurance and the Insurance Markets
3. Cyber Incident Prevention and Incident Response
4. Key Takeaways
5. Q&A
6. Additional Information
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
Cyber Exposures in the Construction Industry
Brian J. Hunt, CPA, CRIS, CBCP
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
4
Why Should I Worry About Cyber Exposures
 Cyber crime will cost companies roughly $6T USD per year on average through 2021
 According to Forester, 75% of construction, engineering and infrastructure companies were impacted by a
cyber-incident in the past 12 months
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
5
Is Techonology in Construction Just a Fad??
“Eighty percent of construction firms report they are having a hard time filling hourly craft
positions that represent the bulk of the construction workforce, according to the results
of an industry-wide survey released today by Autodesk and the Associated General
Contractors of America (AGC). Association officials said shortages pose a significant
risk to future economic growth and they released a new workforce development plan to
solve the growing problem.
…Technology can help bridge this gap, and more firms are bringing training in-house to
implement digital strategies such as building information modeling, or BIM, to ease
staffing challenges and train the next generation of industry professionals.”
Source: 2018 Associated General Contractors of America (AGC) Association report
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
6
Overview of Cyber Coverage for Construction Industry
 As the construction industry becomes more connected through internet-connected solutions and remotely
accessible systems it creates more opportunities for hackers to launch a cyberattack:
– Building Information Modeling (BIM)
– Telematics
– Project management software
 Any company who utilizes email or internet for business is at risk for a cyber event.
 Attackers are growing increasingly sophisticated, and are targeting companies like those in Construction who
believe they are safe.
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
7
How is Cyber Theft Done?
 Social engineering - In the context of information security, refers to psychological manipulation of people into
performing actions or divulging confidential information. A type of confidence trick for the purpose of
information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many
steps in a more complex fraud scheme. The term "social engineering" as an act of psychological manipulation
of a human, is also associated with the social sciences, but its usage has caught on among computer and
information security professionals.
– e.g. Phishing – The fraudulent attempt to obtain sensitive information such as usernames, password and
credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an
electronic communication
 Ransomware A type of malicious software from cryptovirology that threatens to publish the victim's data or
perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system in
a way which is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique
called cryptoviral extortion, in which it encrypts the victim's files, making them inaccessible, and demands a
ransom payment to decrypt them.
– In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an
intractable problem – and difficult to trace digital currencies such as Ukash and cryptocurrency are used for
the ransoms, making tracing and prosecuting the perpetrators difficult.
Source: Wikipedia
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
8
Overview of Cyber Coverage for Construction Industry
 Construction firms have access to a wealth of information that might be desirable to hackers.
– intellectual property
– proprietary assets
– architectural drawings / specifications
– building schematics or blueprints
– more.
 Construction firms have valuable details on their clients (e.g, corporate banking and financial account
information) each which are prime targets for attack.
 Construction firms are frequently targeted with spear phishing campaigns looking to gain access to employee
information such as full names, Social Security numbers and bank account data used for payroll.
 Hackers often go after general contractors and subcontractors as a means to gain access to clients’ networks.
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
9
Construction Trailers are not Ft. Knox
 With multiple stakeholders using mobile devices
(e.g. phones, laptops), there are increased access
points to networks
 Valuable technology (e.g., laptops) is often found
and accessible on jobsites in unsecured trailers
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
10
Industry Instances of Cybercrime
 Turner Construction was the victim of a spear phishing scam in March 2015
– employee sent tax information on current and former employees to a fraudulent email account.
• spear phishing is an email scam targeted at a specific individual, business or organization
• the information provided to the fraudulent email account included full names, Social Security numbers,
states of employment and residence as well as tax withholding data for 2015.
• all employees who worked for the company in 2015 were affected by the data breach.
 Baltimore-based Whiting-Turner Contracting may have also been the victim of a data breach.
– The company was notified by an outside vendor that prepared W-2 and 1095 tax forms for the company’s
employees about suspicious activity on that vendor’s systems.
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
11
Think You Are Immune?
Company Size: $200M in Corporate Program per year & $100-150M in Projects per year
 Large Civil/General Construction company in a Gulf Coast state
 Hackers took total control of all systems (Email both internal & external, payroll, phones, accounting, etc.) and
demanded $250k in Bitcoin
 After months of negotiating, ended up paying $150k in Bitcoin to get their systems back
 Client was emailing on personal gmail accounts
 Multiple NOC’s went out as client didn’t have access to Accounting and could not pay premiums
 Total Downtime = 2.5 – 3 Months
 Client rejected Cyber before IRMI, declined the Cyber meeting with the markets at IRMI, and rejected
coverage at Renewal
– They were hacked roughly 2-3 weeks later
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
12
The Regulatory Environment
 The jurisdictional requirements vary across countries with multinational businesses likely to have to comply
with multiple cybercrime or data breach measures.
 In the United States for example, class action lawsuits are typically launched in the aftermath of a data
breach.
 The convergence of physical and technical security brings greater challenges to the construction industry
organizations. If the cause of a cyber breach is traced back to a construction partner as evidenced by the
Target breach, the consequences can be dire.
 Good cybersecurity can be an enabler to businesses in today’s interconnected and ever increasingly
connected world and therefore, adapting a business focused and proactive approach to cybersecurity risk
management will reap wider benefits rather than simply offer protection to previously unaddressed risks
 Construction firms should instill and maintain discipline in adhering to their risk-governance framework and
policies. They are likely to benefit from continuous monitoring of the evolving threat landscape, and from
adopting a nimble approach toward managing cyber risk.
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
13
Is It Covered?
 John Smith, controller for Big Old Construction, gets an email from the company’s CFO, Jane Doe
 Jane sends instructions to John to send $10M USD to an account in Geneva to complete a deal that the Board
has authorized.
 At first glance, John sees nothing out of the ordinary with the word pattern in the e-mail and the email address
looks correct
 John sends the funds in accordance with Jane’s wishes
 Upon Jane’s return to the office, John realizes the e-mail was a hoax
Is the loss of $10M USD covered by Big Old Construction’s cyber policy?
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
Overview of Cyber Insurance and the Insurance
Markets
Joseph Salazar
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
15
2018 situation: Rising cyber threats and increased complexity
Embedded digital technology (IoT, IIoT)
Rapidly evolving threat environment
Foreign nation states, economic
espionage, hacktivists looking for
entry to partner companies
Significant business disruption or business
elimination risks
IT resources scarce; need to
make compromises
Evolving global regulatory landscape; GDPR
Human error and insider risk
Third party risk; potential liability or
disruption from vendors and partners
Now more than ever,
organizations are relying on
interconnected technology
solutions and an IT
organization to ensure their
functionality. With this
reliance on technology
and need for automation,
enhanced cybersecurity and risk
transfer are essential. As quickly
as technology advances, the
threat landscape evolves faster.
Understanding your risks, and
charting a plan to mitigate
exposures, will protect your
company, your revenue, and
foster business continuity.
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
16
Cyber Risk Impacts All Loss Quadrants
Cyber Loss Spectrum
Any major cyber event will result in
 Public relations, response, and continuity costs
 Immediate and extended revenue loss
 Restoration expenses
 Defense costs
Third parties will seek to recover
 Civil penalties and awards
 Consequential revenue loss
 Restoration expenses
Physical damage is possible
 Property damage
 Bodily injury
Physical damage may cascade to others
 3rd party property damage
 3rd party bodily injury
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
17
Global Cyber Insurance Marketplace - 2018
 AIG
 Allianz
 Arch
 Argo
 Aspen
 At-Bay
 AXIS
 AWAC
 BCS
 Beazley
 Berkley
 Berkshire
Hathaway
 Cap
Specialty
 Chubb
 CNA
 Coalition
 CV Starr
 Great
American
 NAS
 Nationwide
 Navigators
 Hartford
 HCC
 Hiscox
 Huntersure
 Liberty/
Ironshore
 MunichRe
 QBE
 RLI
 RSUI
 Safety
National
 SCOR
 Sompo
 Swiss Re
 Travelers
 Validus
 XL- Catlin
 Zurich
 AIG
 Allianz
 Amlin
 Amtrust
 Ascent
 Aspen
 Argo
 Aviva
 AXA
 Axis
 Barbican
 Beazley
 Brit
 CFC
 Chubb
 EmergIn
Risk
 Hannover
Re
 HCC
 HDI Gerling
 Hiscox
 Liberty
 Markel
 Munich Re
 Navigators
 Neon
/Tarian
 Nirvana
 QBE
 Sciemus
 SCOR
 Swiss Re
 Talbot
 Tokio
Marine Kiln
 WRB
 XL- Catlin
 Zurich
 AIG
 Chubb
 Markel
 Argo
 Aspen
 AWAC
 AXIS
 Sompo
 Iron-Starr
 XL - Catlin
74%
20%
6%
Aon Client Premium Spend
Domestic
London
Bermuda
DOMESTIC LONDON BERMUDA
(Excess only)
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
18
Q3 2018 Market Snapshot
Capacity Coverage Claims &
Losses
Retentions
Note: This is a general summary and could vary based on client industry and size
Capacity is continuing
to grow across
geographies
Coverage continues
to evolve and become
more valuable for
Insureds
Stronger data is being
gathered as more
breaches are reported
Retentions are being
reviewed since
WannaCry, NotPetya and
Equifax incidents
Pricing trends are
competitive, but
increasing for some
industries
 Over 75 unique
Insurers providing E&O
/ Cyber Liability
capacity
 Capacity is available
the United States,
London and Bermuda
 Growing number of
Insurers developing
appetites for large,
complex risks
 There is over $700M in
theoretical capacity
available in the
E&O/Cyber market
place
 Coverage breadth
continues to expand
 Insurers continue to
differentiate their
offerings with new or
enhanced coverage
components
 Emphasis on pre-
arranged vendors
 Broadening systems
failure and contingent
business interruption
coverage solutions
 Increased ransomware
activity and business
interruption concerns
 Complexity of breaches
has driven an increase
in incident response
expenses incurred by
Insureds
 Claims and loss data
has expanded coverage
offerings and improved
actuarial data for loss
modeling purposes
 Increasingly punitive
legal and regulatory
environment
 Retentions of all levels
are available in the
market, but can vary
greatly based on
industry class, size and
unique exposures
 Adjusting retentions
can lead to increased
coverage and/or pricing
flexibility
 Average premium rates
reflect a decline –
however dependent
upon underwriting and
scope of coverage
 Excess rate
environment continues
to be competitive
 Some Insureds have
secured significant
coverage improvements
as a result of paying
higher premiums
Pricing
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
19
2018 Purchasing Trends by Industry
Limit increases at renewal
 Companies in a number of industries, including financial institutions, hospitality, healthcare, retail,
manufacturing, technology, media and transportation, are seeking higher limits options
 For other industries, many organizations are still evaluating the purchase of cyber insurance or use of their
captive to provide cyber cover due to regulatory, contract, D&O, benchmarking / loss information and financial
statement pressures, among other reasons
More new buyers
 Manufacturing, critical infrastructure, pharmaceutical / life sciences, industrials & materials / automotive, public
sector, energy / power and utilities, higher education, real estate / construction, agribusiness and transportation
/ logistics industries saw the biggest uptick in new cyber insurance purchases in 2018
 Major concern in these industries is business interruption loss and reliance on technology
Shifting focus on cyber risk exposures
 In prior years, organizations’ primary cyber concern was related to privacy breaches
 In 2018, more clients across all industries have focused on business interruption coverage, including
system failure cover, cyber extortion and digital asset restoration
 Cyber insurance cases where courts upheld denial of coverage demonstrate the critical importance of
matching customized policy wording to specific insured cyber exposures
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
20
The reality
average cost malware
attack spend1
annual increase in
ransomware damage
costs by 20192
records exposed in
the first half
of 20173
of all cyberattacks last
year struck SMBs4
60%$11.5B+$2.4M+ 6B+
1Source: 2017 Ponemon, 2017 Cost of Cybercrime Study
2Source: 2017 Cost of Cybercrime Study to 2017 CSO Magazine Cybersecurity Business Report
3Source: Data Breach Trends - First Six Months of 2017, Risk Based Security, July 2017
4Source: Keeper Security and Ponemon Institute, June 2016. 2017 Cost Of Cyber Crime Study,
Ponemon Institute and Accenture, September 2017
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
21
Market Standard Cyber Coverages Overview
Operational
Risk
 Network Business Interruption
 System Failure
 Dependent Business Interruption / System Failure
 Cyber Extortion
 Digital Asset Restoration
Privacy and
Network Security
Risk
 Privacy and Network Security Liability
 Privacy Regulatory Fines and Penalties
 Media Liability
 PCI Fines and Penalties
 Breach Event Expenses
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
22
Scope of Cyber Insurance Coverage
• Network Business Interruption - Reimbursement coverage for the insured
for lost net income caused by a network security failure, as well as
associated extra expense. Retention and waiting periods are negotiable
• System Failure - Expands coverage trigger for business interruption beyond
computer network security failure to include any system failure
• Dependent Business Interruption/Dependent System Failure -
Reimbursement coverage for the insured for lost income caused by a network
security failure of a business on which the insured is dependent, as well as
associated extra expense. Retentions and waiting periods are negotiable.
• Cyber Extortion - Reimbursement coverage for the insured for expenses
incurred in the investigation of a threat and any extortion payments made to
prevent or resolve the threat.
• Digital Asset Restoration - Reimbursement coverage for the insured for
costs incurred to restore, recollect, or recreate intangible, non-physical assets
(software or data) that are corrupted, destroyed or deleted due to a network
security failure
Operational
Risk
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
23
Scope of Cyber Insurance Coverage
Privacy and
Network Security
Risk
 Privacy and Network Security Liability –
 Privacy Liability: Liability coverage for defense costs and damages suffered by others for any failure to
protect personally identifiable or confidential third-party corporate information, whether or not due to a
failure of network security. Coverage may include: unintentional violations of the insured’s privacy
policy, actions of rogue employees, and alleged wrongful collection of confidential
 Security Liability: Liability coverage for defense costs and damages suffered by others resulting from a
failure of computer security, including liability caused by theft or disclosure of confidential information,
unauthorized access, unauthorized use, denial of service attack or transmission of a computer virus
 Privacy Regulatory Fines and Penalties - Liability coverage for defense costs for proceedings brought by a
governmental agency in connection with a failure to protect private information and/or a failure of network
security. Coverage includes fines and penalties where insurable by law. Compensatory damages, i.e. amounts
the insured is required by a regulator to deposit into a consumer redress fund, may be covered
 Media Liability - Liability coverage for defense costs and damages suffered by others for content-based injuries
such as libel, slander, defamation, copyright infringement, trademark infringement, or invasion of privacy. The
scope of covered media is variable and can range from the insured’s website only to all content in any medium
 PCI Fines and Penalties - Coverage for a monetary assessment (including a contractual fine or penalty) from a
Payment Card Association (e.g., MasterCard, Visa, American Express) or bank processing payment card
transactions (i.e., an “Acquiring Bank”) in connection with an Insured’s non-compliance with PCI Data Security
Standards
 Breach Event Expenses - Reimbursement coverage for the insured’s costs to respond to a data privacy or
security incident. Policy triggers vary but are typically based on discovery of an event, or a statutory obligation to
notify consumers of an event. Covered expenses include computer forensics expenses, legal expenses, costs for
a public relations firm and related advertising to restore your reputation, consumer notification, call centers, and
consumer credit monitoring services
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
Cyber Incident Prevention and Incident Response
Jeffrey Shaffer
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
25
The Battleground
IDS, IPS, Threat Intel, SIEM, SOC, Awareness, IR
Plans, Visibility, IoT, Mobile, AI, Malware RE
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
26
The adversaries
What’s most at risk?
Emerging
technologies
Military
technologies
Advanced
materials and
manufacturing
techniques
Healthcare, pharma.
and related
technologies
Business deals,
strategy and
M&A
informationHealth
records PHI
and other
personal data
Industrial Control
Systems
(SCADA)
R&D and / or
product design
data
Payment card and
related information /
financial transactions
INSIDERSAlso:
Nuisance activity and more like
DDOS and CPU usage to mine BitCoin
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
27
Board and C-Suite Concerns
As high profile cyber attacks become
more common, executive
management teams and boards are
deeply concerned:
Is the business resilient
to a cyber attack?
How much risk are we
willing to take?
Could a cyber incident
impact our business?
About which threats
should we be most
concerned?
Are we spending in the
right areas?
Are there gaps in our
cyber security
capabilities?
 Increasing demands from customers/business partners due to third party risk management initiatives
 Increasing demands from investors for insight in to the management of risk in companies
 Increasing complexity in regulations, and requirements, relating to cyber security practices, and focus of regulatory
examinations
 Continued outsourcing of information technology (e.g., cloud service providers) and security operations leading to
greater complexity in risk management
The Board needs to be confident
that they have a “defensible” cyber
security risk management program
in place
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
28
Yahoo’s Top Lawyer Resigns and
C.E.O. Marissa Mayer Loses Bonus
in Wake of Hack
The Panama Papers are:
11.5 million leaked documents detailing financial and attorney-client
information for more than 214 offshore entities
Who Is Ultimately Accountable When a
Big Breach Happens?
Where Is Your Sensitive Information stored?
Where Is It Going? How does it get there?
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
29
Threat Actors and their Motives
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
30
A little of what I have seen
Don’t be next
 Large retail store gets phished with C2.
$6Million
 IT Company sees threat actor for 4, no
wait, 15 months, takes no action.
 Threat actor was in environment of a
large tech company for 5 years
 Software security controls physical
components
 100 mobile apps, 21 permissions and
more
Response, Remediation, Rebuild
Monitoring is not useful without response
Resource allocation and interoperability
Threat Intelligence, IDS and thorough forensics
Cyber security is not a wall, it should be a malleable 360* bubble
Internet of Things hacking vs. ICS
Mobile visibility and control
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
31
PRIVILEGE
ESCALATION
LATERAL
MOVEMENT
INFILTRATION
DATA
AGGREGATION
DATA
EXFILTRATION
Common Stages of a
Breach Lifecycle
A breach detected in 30 days saves $1 million.
Average breach cost $3.8 million. Up 6.4% from 2017
Biggest motive? $$$$$$$$
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
32
Mobile and IoT in the Enterprise – EMM, MDM, MCM,MAM
• Touch points and carriers
• IoT – Synching with everything
• Jump technology
• Medical devices – Injectible, Implantable, Wearable, Injestable
• Operates on both sides of your firewall
• Able to circumvent security controls with Bluetooth, NFC, WiFi, etc;
• Drones, AI, Robotics, Infotainment, Telematics
• Many applications use HTTP only
• Users and 5 generations
• 30% of apps access to contact information
• 30% of apps access GPS information
• 31% of apps access calendar information
• 39% of apps access smartphone’s microphone
• 75% of apps access the camera
• 34% of mobile com is not encrypted
• Business apps 3X ore likely to leak log in creds
• Soc. Media apps 3x more likely to expose pw’s
• 60K apps added to store/month
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
33
2018 Crowdstrike Report
The Internet
(more or less)
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
34
Cyber Resilience Solutions Framework Services
Assess
+ Security Architecture Assessment
+ Security Controls Assessment
+ Security Maturity Assessment
+ Compliance Readiness
Assessment
+ Security Risk Assessment
+ Security Strategy Assessment
+ IR Readiness Assessment
+ M&A Due Diligence Assessment
+ Third-Party Risk Assessment
+ Privacy Compliance Assessment
+ Cyber Framework Assessment
Test
+ Red Team Security Testing
+ Social Engineering Testing
+ Application Security Testing
+ Network & Cloud Penetration
Testing and Configuration Review
+ Source Code Security Review
+ Threat Hunting
Improve
+ Security Strategy Development
+ Security Controls Optimization
+ IR Planning & Playbook
Development
+ Information Security Policies
& Standards Development
+ Security Design & Architecture
+ SOC Optimization
+ Cyber Threat
Simulations/Tabletops
+ Third Party Cyber Risk
Management
+ CISO Advisory
+ Board Advisory
+ Compliance Program
Development
+ Insider Risk Program
Development
+ Secure Software Development
Lifecycle
+ Security Training & Awareness
Quantify
+ Cyber Insight
+ Cyber Impact Analysis
+ Risk Financing Decision
Platform (RFDP)
+ CyberMetrica
+ Cyber Portfolio
Aggregation Analysis
Respond
+ Incident & Breach
Response
+ Reversing Malware
+ Digital Evidence
Preservation
+ Expert Witness Testimony
+ Claims Advocacy
+ Complex Cyber Loss
Preparation
Transfer
+ Cyber Insurance
+ Aon Cyber
Enterprise Solution
+ Insurance Program
Review
+ Proprietary Peer
Benchmarking
+ Global Broking Center
+ Aon Client Treaty
+ Aon Benfield
Reinsurance Capacity
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
35
World Class Talent Drawn From Top Organizations
1. British Army - The Intelligence Corps
2. U.S. Department of the Air Force
3. U.S. Postal Inspection Service
4. U.S. National Security Agency
5. U.S. Marshalls Service
6. Federal Bureau of Investigation
7. U.S. Internal Revenue Agency
8. Financial Services Authority
9. U.S. Department of Defense
10. U.S. Security & Exchange Commission
11. U.S. Federal Trade Commission
12. U.S. Department of Justice
13. Office of Special Investigations
14. U.S. Secret Service
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
Key Takeaways
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
37
Hope is NOT a Plan
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
38
Q&A
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
Additional Information
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
40
Additional Information
Risk Management 101
Thursday, October 4 2018
Royal Oaks Country Club
7915 Greenville Avenue | Dallas, Texas 75231
CPE for Texas CPA's - 9.5 hours
Topics Covered
 Property
 Automobile Liability
 Certificates of Insurance
 Workers Compensation
 Texas Non-Subscription
 General Liability/Umbrella
 Management Liabilities
 Cyber-security
 Environmental
 Surety
Aon Risk Solutions | Global Sales & Marketing Support
Proprietary & Confidential
41
Contact Information
brian.hunt@aon.com
joseph.salazar@aon.com
jeffrey.shaffer@aon.com

Contenu connexe

Tendances

Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurityMark Albala
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021Management Events
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E CommerceEamonnORagh
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance TempRohan Sehgal
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Ashish Chauhan
 
Information Security
Information SecurityInformation Security
Information Securitytrunko
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021lior mazor
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
 
Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics Chris Stallard
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
Neira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf readyNeira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf readyNeira Jones
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersMerry D'souza
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprisesTaranggg11
 
Emerging Risks, BCP & DRP
Emerging Risks, BCP & DRPEmerging Risks, BCP & DRP
Emerging Risks, BCP & DRPJorge Sebastiao
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterPatricia M Watson
 

Tendances (20)

Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
In the news
In the newsIn the news
In the news
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...
 
Information Security
Information SecurityInformation Security
Information Security
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
Neira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf readyNeira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf ready
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
Retail
Retail Retail
Retail
 
Emerging Risks, BCP & DRP
Emerging Risks, BCP & DRPEmerging Risks, BCP & DRP
Emerging Risks, BCP & DRP
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
 

Similaire à Cyber Risk Solutions for the Construction Industry

Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Graeme Cross
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfBrafton
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachUlf Mattsson
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowDharmendra Rama
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdfRakeshPatel583282
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Citrin Cooperman
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 

Similaire à Cyber Risk Solutions for the Construction Industry (20)

Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Cyber
Cyber Cyber
Cyber
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 

Dernier

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Dernier (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Cyber Risk Solutions for the Construction Industry

  • 1. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential Cyber Risk for the Construction Industry Date: 20 September 2018
  • 2. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 2 Agenda 1. Cyber Exposures in the Construction Industry 2. Overview of Cyber Insurance and the Insurance Markets 3. Cyber Incident Prevention and Incident Response 4. Key Takeaways 5. Q&A 6. Additional Information
  • 3. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential Cyber Exposures in the Construction Industry Brian J. Hunt, CPA, CRIS, CBCP
  • 4. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 4 Why Should I Worry About Cyber Exposures  Cyber crime will cost companies roughly $6T USD per year on average through 2021  According to Forester, 75% of construction, engineering and infrastructure companies were impacted by a cyber-incident in the past 12 months
  • 5. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 5 Is Techonology in Construction Just a Fad?? “Eighty percent of construction firms report they are having a hard time filling hourly craft positions that represent the bulk of the construction workforce, according to the results of an industry-wide survey released today by Autodesk and the Associated General Contractors of America (AGC). Association officials said shortages pose a significant risk to future economic growth and they released a new workforce development plan to solve the growing problem. …Technology can help bridge this gap, and more firms are bringing training in-house to implement digital strategies such as building information modeling, or BIM, to ease staffing challenges and train the next generation of industry professionals.” Source: 2018 Associated General Contractors of America (AGC) Association report
  • 6. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 6 Overview of Cyber Coverage for Construction Industry  As the construction industry becomes more connected through internet-connected solutions and remotely accessible systems it creates more opportunities for hackers to launch a cyberattack: – Building Information Modeling (BIM) – Telematics – Project management software  Any company who utilizes email or internet for business is at risk for a cyber event.  Attackers are growing increasingly sophisticated, and are targeting companies like those in Construction who believe they are safe.
  • 7. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 7 How is Cyber Theft Done?  Social engineering - In the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. The term "social engineering" as an act of psychological manipulation of a human, is also associated with the social sciences, but its usage has caught on among computer and information security professionals. – e.g. Phishing – The fraudulent attempt to obtain sensitive information such as usernames, password and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication  Ransomware A type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. – In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as Ukash and cryptocurrency are used for the ransoms, making tracing and prosecuting the perpetrators difficult. Source: Wikipedia
  • 8. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 8 Overview of Cyber Coverage for Construction Industry  Construction firms have access to a wealth of information that might be desirable to hackers. – intellectual property – proprietary assets – architectural drawings / specifications – building schematics or blueprints – more.  Construction firms have valuable details on their clients (e.g, corporate banking and financial account information) each which are prime targets for attack.  Construction firms are frequently targeted with spear phishing campaigns looking to gain access to employee information such as full names, Social Security numbers and bank account data used for payroll.  Hackers often go after general contractors and subcontractors as a means to gain access to clients’ networks.
  • 9. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 9 Construction Trailers are not Ft. Knox  With multiple stakeholders using mobile devices (e.g. phones, laptops), there are increased access points to networks  Valuable technology (e.g., laptops) is often found and accessible on jobsites in unsecured trailers
  • 10. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 10 Industry Instances of Cybercrime  Turner Construction was the victim of a spear phishing scam in March 2015 – employee sent tax information on current and former employees to a fraudulent email account. • spear phishing is an email scam targeted at a specific individual, business or organization • the information provided to the fraudulent email account included full names, Social Security numbers, states of employment and residence as well as tax withholding data for 2015. • all employees who worked for the company in 2015 were affected by the data breach.  Baltimore-based Whiting-Turner Contracting may have also been the victim of a data breach. – The company was notified by an outside vendor that prepared W-2 and 1095 tax forms for the company’s employees about suspicious activity on that vendor’s systems.
  • 11. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 11 Think You Are Immune? Company Size: $200M in Corporate Program per year & $100-150M in Projects per year  Large Civil/General Construction company in a Gulf Coast state  Hackers took total control of all systems (Email both internal & external, payroll, phones, accounting, etc.) and demanded $250k in Bitcoin  After months of negotiating, ended up paying $150k in Bitcoin to get their systems back  Client was emailing on personal gmail accounts  Multiple NOC’s went out as client didn’t have access to Accounting and could not pay premiums  Total Downtime = 2.5 – 3 Months  Client rejected Cyber before IRMI, declined the Cyber meeting with the markets at IRMI, and rejected coverage at Renewal – They were hacked roughly 2-3 weeks later
  • 12. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 12 The Regulatory Environment  The jurisdictional requirements vary across countries with multinational businesses likely to have to comply with multiple cybercrime or data breach measures.  In the United States for example, class action lawsuits are typically launched in the aftermath of a data breach.  The convergence of physical and technical security brings greater challenges to the construction industry organizations. If the cause of a cyber breach is traced back to a construction partner as evidenced by the Target breach, the consequences can be dire.  Good cybersecurity can be an enabler to businesses in today’s interconnected and ever increasingly connected world and therefore, adapting a business focused and proactive approach to cybersecurity risk management will reap wider benefits rather than simply offer protection to previously unaddressed risks  Construction firms should instill and maintain discipline in adhering to their risk-governance framework and policies. They are likely to benefit from continuous monitoring of the evolving threat landscape, and from adopting a nimble approach toward managing cyber risk.
  • 13. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 13 Is It Covered?  John Smith, controller for Big Old Construction, gets an email from the company’s CFO, Jane Doe  Jane sends instructions to John to send $10M USD to an account in Geneva to complete a deal that the Board has authorized.  At first glance, John sees nothing out of the ordinary with the word pattern in the e-mail and the email address looks correct  John sends the funds in accordance with Jane’s wishes  Upon Jane’s return to the office, John realizes the e-mail was a hoax Is the loss of $10M USD covered by Big Old Construction’s cyber policy?
  • 14. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential Overview of Cyber Insurance and the Insurance Markets Joseph Salazar
  • 15. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 15 2018 situation: Rising cyber threats and increased complexity Embedded digital technology (IoT, IIoT) Rapidly evolving threat environment Foreign nation states, economic espionage, hacktivists looking for entry to partner companies Significant business disruption or business elimination risks IT resources scarce; need to make compromises Evolving global regulatory landscape; GDPR Human error and insider risk Third party risk; potential liability or disruption from vendors and partners Now more than ever, organizations are relying on interconnected technology solutions and an IT organization to ensure their functionality. With this reliance on technology and need for automation, enhanced cybersecurity and risk transfer are essential. As quickly as technology advances, the threat landscape evolves faster. Understanding your risks, and charting a plan to mitigate exposures, will protect your company, your revenue, and foster business continuity.
  • 16. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 16 Cyber Risk Impacts All Loss Quadrants Cyber Loss Spectrum Any major cyber event will result in  Public relations, response, and continuity costs  Immediate and extended revenue loss  Restoration expenses  Defense costs Third parties will seek to recover  Civil penalties and awards  Consequential revenue loss  Restoration expenses Physical damage is possible  Property damage  Bodily injury Physical damage may cascade to others  3rd party property damage  3rd party bodily injury
  • 17. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 17 Global Cyber Insurance Marketplace - 2018  AIG  Allianz  Arch  Argo  Aspen  At-Bay  AXIS  AWAC  BCS  Beazley  Berkley  Berkshire Hathaway  Cap Specialty  Chubb  CNA  Coalition  CV Starr  Great American  NAS  Nationwide  Navigators  Hartford  HCC  Hiscox  Huntersure  Liberty/ Ironshore  MunichRe  QBE  RLI  RSUI  Safety National  SCOR  Sompo  Swiss Re  Travelers  Validus  XL- Catlin  Zurich  AIG  Allianz  Amlin  Amtrust  Ascent  Aspen  Argo  Aviva  AXA  Axis  Barbican  Beazley  Brit  CFC  Chubb  EmergIn Risk  Hannover Re  HCC  HDI Gerling  Hiscox  Liberty  Markel  Munich Re  Navigators  Neon /Tarian  Nirvana  QBE  Sciemus  SCOR  Swiss Re  Talbot  Tokio Marine Kiln  WRB  XL- Catlin  Zurich  AIG  Chubb  Markel  Argo  Aspen  AWAC  AXIS  Sompo  Iron-Starr  XL - Catlin 74% 20% 6% Aon Client Premium Spend Domestic London Bermuda DOMESTIC LONDON BERMUDA (Excess only)
  • 18. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 18 Q3 2018 Market Snapshot Capacity Coverage Claims & Losses Retentions Note: This is a general summary and could vary based on client industry and size Capacity is continuing to grow across geographies Coverage continues to evolve and become more valuable for Insureds Stronger data is being gathered as more breaches are reported Retentions are being reviewed since WannaCry, NotPetya and Equifax incidents Pricing trends are competitive, but increasing for some industries  Over 75 unique Insurers providing E&O / Cyber Liability capacity  Capacity is available the United States, London and Bermuda  Growing number of Insurers developing appetites for large, complex risks  There is over $700M in theoretical capacity available in the E&O/Cyber market place  Coverage breadth continues to expand  Insurers continue to differentiate their offerings with new or enhanced coverage components  Emphasis on pre- arranged vendors  Broadening systems failure and contingent business interruption coverage solutions  Increased ransomware activity and business interruption concerns  Complexity of breaches has driven an increase in incident response expenses incurred by Insureds  Claims and loss data has expanded coverage offerings and improved actuarial data for loss modeling purposes  Increasingly punitive legal and regulatory environment  Retentions of all levels are available in the market, but can vary greatly based on industry class, size and unique exposures  Adjusting retentions can lead to increased coverage and/or pricing flexibility  Average premium rates reflect a decline – however dependent upon underwriting and scope of coverage  Excess rate environment continues to be competitive  Some Insureds have secured significant coverage improvements as a result of paying higher premiums Pricing
  • 19. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 19 2018 Purchasing Trends by Industry Limit increases at renewal  Companies in a number of industries, including financial institutions, hospitality, healthcare, retail, manufacturing, technology, media and transportation, are seeking higher limits options  For other industries, many organizations are still evaluating the purchase of cyber insurance or use of their captive to provide cyber cover due to regulatory, contract, D&O, benchmarking / loss information and financial statement pressures, among other reasons More new buyers  Manufacturing, critical infrastructure, pharmaceutical / life sciences, industrials & materials / automotive, public sector, energy / power and utilities, higher education, real estate / construction, agribusiness and transportation / logistics industries saw the biggest uptick in new cyber insurance purchases in 2018  Major concern in these industries is business interruption loss and reliance on technology Shifting focus on cyber risk exposures  In prior years, organizations’ primary cyber concern was related to privacy breaches  In 2018, more clients across all industries have focused on business interruption coverage, including system failure cover, cyber extortion and digital asset restoration  Cyber insurance cases where courts upheld denial of coverage demonstrate the critical importance of matching customized policy wording to specific insured cyber exposures
  • 20. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 20 The reality average cost malware attack spend1 annual increase in ransomware damage costs by 20192 records exposed in the first half of 20173 of all cyberattacks last year struck SMBs4 60%$11.5B+$2.4M+ 6B+ 1Source: 2017 Ponemon, 2017 Cost of Cybercrime Study 2Source: 2017 Cost of Cybercrime Study to 2017 CSO Magazine Cybersecurity Business Report 3Source: Data Breach Trends - First Six Months of 2017, Risk Based Security, July 2017 4Source: Keeper Security and Ponemon Institute, June 2016. 2017 Cost Of Cyber Crime Study, Ponemon Institute and Accenture, September 2017
  • 21. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 21 Market Standard Cyber Coverages Overview Operational Risk  Network Business Interruption  System Failure  Dependent Business Interruption / System Failure  Cyber Extortion  Digital Asset Restoration Privacy and Network Security Risk  Privacy and Network Security Liability  Privacy Regulatory Fines and Penalties  Media Liability  PCI Fines and Penalties  Breach Event Expenses
  • 22. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 22 Scope of Cyber Insurance Coverage • Network Business Interruption - Reimbursement coverage for the insured for lost net income caused by a network security failure, as well as associated extra expense. Retention and waiting periods are negotiable • System Failure - Expands coverage trigger for business interruption beyond computer network security failure to include any system failure • Dependent Business Interruption/Dependent System Failure - Reimbursement coverage for the insured for lost income caused by a network security failure of a business on which the insured is dependent, as well as associated extra expense. Retentions and waiting periods are negotiable. • Cyber Extortion - Reimbursement coverage for the insured for expenses incurred in the investigation of a threat and any extortion payments made to prevent or resolve the threat. • Digital Asset Restoration - Reimbursement coverage for the insured for costs incurred to restore, recollect, or recreate intangible, non-physical assets (software or data) that are corrupted, destroyed or deleted due to a network security failure Operational Risk
  • 23. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 23 Scope of Cyber Insurance Coverage Privacy and Network Security Risk  Privacy and Network Security Liability –  Privacy Liability: Liability coverage for defense costs and damages suffered by others for any failure to protect personally identifiable or confidential third-party corporate information, whether or not due to a failure of network security. Coverage may include: unintentional violations of the insured’s privacy policy, actions of rogue employees, and alleged wrongful collection of confidential  Security Liability: Liability coverage for defense costs and damages suffered by others resulting from a failure of computer security, including liability caused by theft or disclosure of confidential information, unauthorized access, unauthorized use, denial of service attack or transmission of a computer virus  Privacy Regulatory Fines and Penalties - Liability coverage for defense costs for proceedings brought by a governmental agency in connection with a failure to protect private information and/or a failure of network security. Coverage includes fines and penalties where insurable by law. Compensatory damages, i.e. amounts the insured is required by a regulator to deposit into a consumer redress fund, may be covered  Media Liability - Liability coverage for defense costs and damages suffered by others for content-based injuries such as libel, slander, defamation, copyright infringement, trademark infringement, or invasion of privacy. The scope of covered media is variable and can range from the insured’s website only to all content in any medium  PCI Fines and Penalties - Coverage for a monetary assessment (including a contractual fine or penalty) from a Payment Card Association (e.g., MasterCard, Visa, American Express) or bank processing payment card transactions (i.e., an “Acquiring Bank”) in connection with an Insured’s non-compliance with PCI Data Security Standards  Breach Event Expenses - Reimbursement coverage for the insured’s costs to respond to a data privacy or security incident. Policy triggers vary but are typically based on discovery of an event, or a statutory obligation to notify consumers of an event. Covered expenses include computer forensics expenses, legal expenses, costs for a public relations firm and related advertising to restore your reputation, consumer notification, call centers, and consumer credit monitoring services
  • 24. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential Cyber Incident Prevention and Incident Response Jeffrey Shaffer
  • 25. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 25 The Battleground IDS, IPS, Threat Intel, SIEM, SOC, Awareness, IR Plans, Visibility, IoT, Mobile, AI, Malware RE
  • 26. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 26 The adversaries What’s most at risk? Emerging technologies Military technologies Advanced materials and manufacturing techniques Healthcare, pharma. and related technologies Business deals, strategy and M&A informationHealth records PHI and other personal data Industrial Control Systems (SCADA) R&D and / or product design data Payment card and related information / financial transactions INSIDERSAlso: Nuisance activity and more like DDOS and CPU usage to mine BitCoin
  • 27. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 27 Board and C-Suite Concerns As high profile cyber attacks become more common, executive management teams and boards are deeply concerned: Is the business resilient to a cyber attack? How much risk are we willing to take? Could a cyber incident impact our business? About which threats should we be most concerned? Are we spending in the right areas? Are there gaps in our cyber security capabilities?  Increasing demands from customers/business partners due to third party risk management initiatives  Increasing demands from investors for insight in to the management of risk in companies  Increasing complexity in regulations, and requirements, relating to cyber security practices, and focus of regulatory examinations  Continued outsourcing of information technology (e.g., cloud service providers) and security operations leading to greater complexity in risk management The Board needs to be confident that they have a “defensible” cyber security risk management program in place
  • 28. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 28 Yahoo’s Top Lawyer Resigns and C.E.O. Marissa Mayer Loses Bonus in Wake of Hack The Panama Papers are: 11.5 million leaked documents detailing financial and attorney-client information for more than 214 offshore entities Who Is Ultimately Accountable When a Big Breach Happens? Where Is Your Sensitive Information stored? Where Is It Going? How does it get there?
  • 29. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 29 Threat Actors and their Motives
  • 30. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 30 A little of what I have seen Don’t be next  Large retail store gets phished with C2. $6Million  IT Company sees threat actor for 4, no wait, 15 months, takes no action.  Threat actor was in environment of a large tech company for 5 years  Software security controls physical components  100 mobile apps, 21 permissions and more Response, Remediation, Rebuild Monitoring is not useful without response Resource allocation and interoperability Threat Intelligence, IDS and thorough forensics Cyber security is not a wall, it should be a malleable 360* bubble Internet of Things hacking vs. ICS Mobile visibility and control
  • 31. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 31 PRIVILEGE ESCALATION LATERAL MOVEMENT INFILTRATION DATA AGGREGATION DATA EXFILTRATION Common Stages of a Breach Lifecycle A breach detected in 30 days saves $1 million. Average breach cost $3.8 million. Up 6.4% from 2017 Biggest motive? $$$$$$$$
  • 32. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 32 Mobile and IoT in the Enterprise – EMM, MDM, MCM,MAM • Touch points and carriers • IoT – Synching with everything • Jump technology • Medical devices – Injectible, Implantable, Wearable, Injestable • Operates on both sides of your firewall • Able to circumvent security controls with Bluetooth, NFC, WiFi, etc; • Drones, AI, Robotics, Infotainment, Telematics • Many applications use HTTP only • Users and 5 generations • 30% of apps access to contact information • 30% of apps access GPS information • 31% of apps access calendar information • 39% of apps access smartphone’s microphone • 75% of apps access the camera • 34% of mobile com is not encrypted • Business apps 3X ore likely to leak log in creds • Soc. Media apps 3x more likely to expose pw’s • 60K apps added to store/month
  • 33. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 33 2018 Crowdstrike Report The Internet (more or less)
  • 34. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 34 Cyber Resilience Solutions Framework Services Assess + Security Architecture Assessment + Security Controls Assessment + Security Maturity Assessment + Compliance Readiness Assessment + Security Risk Assessment + Security Strategy Assessment + IR Readiness Assessment + M&A Due Diligence Assessment + Third-Party Risk Assessment + Privacy Compliance Assessment + Cyber Framework Assessment Test + Red Team Security Testing + Social Engineering Testing + Application Security Testing + Network & Cloud Penetration Testing and Configuration Review + Source Code Security Review + Threat Hunting Improve + Security Strategy Development + Security Controls Optimization + IR Planning & Playbook Development + Information Security Policies & Standards Development + Security Design & Architecture + SOC Optimization + Cyber Threat Simulations/Tabletops + Third Party Cyber Risk Management + CISO Advisory + Board Advisory + Compliance Program Development + Insider Risk Program Development + Secure Software Development Lifecycle + Security Training & Awareness Quantify + Cyber Insight + Cyber Impact Analysis + Risk Financing Decision Platform (RFDP) + CyberMetrica + Cyber Portfolio Aggregation Analysis Respond + Incident & Breach Response + Reversing Malware + Digital Evidence Preservation + Expert Witness Testimony + Claims Advocacy + Complex Cyber Loss Preparation Transfer + Cyber Insurance + Aon Cyber Enterprise Solution + Insurance Program Review + Proprietary Peer Benchmarking + Global Broking Center + Aon Client Treaty + Aon Benfield Reinsurance Capacity
  • 35. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 35 World Class Talent Drawn From Top Organizations 1. British Army - The Intelligence Corps 2. U.S. Department of the Air Force 3. U.S. Postal Inspection Service 4. U.S. National Security Agency 5. U.S. Marshalls Service 6. Federal Bureau of Investigation 7. U.S. Internal Revenue Agency 8. Financial Services Authority 9. U.S. Department of Defense 10. U.S. Security & Exchange Commission 11. U.S. Federal Trade Commission 12. U.S. Department of Justice 13. Office of Special Investigations 14. U.S. Secret Service
  • 36. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential Key Takeaways
  • 37. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 37 Hope is NOT a Plan
  • 38. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 38 Q&A
  • 39. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential Additional Information
  • 40. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 40 Additional Information Risk Management 101 Thursday, October 4 2018 Royal Oaks Country Club 7915 Greenville Avenue | Dallas, Texas 75231 CPE for Texas CPA's - 9.5 hours Topics Covered  Property  Automobile Liability  Certificates of Insurance  Workers Compensation  Texas Non-Subscription  General Liability/Umbrella  Management Liabilities  Cyber-security  Environmental  Surety
  • 41. Aon Risk Solutions | Global Sales & Marketing Support Proprietary & Confidential 41 Contact Information brian.hunt@aon.com joseph.salazar@aon.com jeffrey.shaffer@aon.com