Cyber insurance the next frontier - Cyber insurance: The next frontier - DXC Technology

Page created by Victoria Lang
 
CONTINUE READING
Cyber insurance: The next frontier

Cyber insurance
the next frontier

                                           1
Cyber insurance: The next frontier

Table of contents
Summary                                                   3
The Market Need                                           3
Cyber Risk: A Growing Concern                             4
Rising Cost of Cyber Crime                                5
Impact by Industry                                        6
Cyber Risk and Insurance                                  7
Cyber Risk under Traditional
Insurance Cover                                           7
Standalone Cyber Cover                                    8
Recent Development in Australia                           8
Considerations when Developing
Cyber Insurance                                           9
Challenges for Insurers                                   9
  Lack of Historic Data                                   9
  Understanding Risk Appetite and
  Risk Aggregation                                        9
Recommendations                                         10
Solving the Data Challenge                               10
  Risk Management                                        10
  Data Pools                                             10
Holistic Risk Solution                                   10
Conclusion                                               11
References                                               12
Cyber insurance: The next frontier

SUMMARY
Since its inception, insurance has always served to manage risk. In the 17th century, a fire could
destroy a shop front, records, and an entire business. Fire insurance served as a means of
managing this risk both financially and actively, as insurers owned fire brigades.
In the 21st century, cyber risk can equally destroy a business by destroying its records and its
reputation. Beyond providing insurance, the standards and guidelines developed by the industry
have the potential to define best practices and act as pseudo-regulations. Organisations need a
means to manage cyber risk outside of their risk appetite; the insurance industry can fulfil this need.
Whilst cyber insurance fulfils a market need, it is also an opportunity for growth for insurance
providers. Market saturation in the insurance industry has meant that insurers have found
organic growth difficult to attain. Insurers that can identify emerging areas and successfully
navigate these trends will be better placed for growth. Insurers looking to capitalise on the
growing cyber insurance market, and develop it into a profitable and sustainable line of business,
must come to terms with the complexity of cyber risk.

The market need
Cyber risk has emerged as one of the top challenges faced by companies worldwide. A string of high-profile data breaches have
populated news headlines across the globe, including those involving Target in 2013, Sony Pictures Entertainment in 2014, and the
Ashley Madison website in 2015. In Australia, David Jones and Kmart both suffered data breaches in October 2015. Statistics from the
Australian Cyber Security Centre (ACSC) show that, during 2014, authorities responded to 11,733 reported cases of cyber incidents
affecting Australian businesses.

In the current cyber landscape, cyber attacks on businesses now appear to be inevitable. For businesses, being attacked is
no longer a matter of ‘if’ but ‘when’. Companies are now more conscious of cyber risk, with a 2015 survey of major Australian
businesses conducted by the ACSC showing that 77 per cent of respondents have a cyber security incident response plan in place.

The issue of cyber risk has extended beyond the realms of IT and has become a strategic business issue. Company boards and
C-level executives are becoming actively involved in cyber risk management decisions.

The increased awareness of cyber risk has also generated increased interest in cyber insurance as a mechanism for risk transfer.
The UK government has actively encouraged the role of insurance in managing and mitigating cyber risk.

According to Fitch Ratings, cyber cover represents a key growth opportunity for the insurance industry, and many insurers have
sought to take advantage of this by offering cyber risk insurance products. While the cyber insurance market is still relatively
small, it is experiencing exponential growth with PwC estimating that the global cyber insurance market will triple in size from
US$2.5 billion in 2014 to US$7.5 billion by 2020. A large Australian insurance broker estimates that its gross written premium for
cyber policies will increase from AU$15 million in 2015 to AU$25 million in 2016.

There are two types of                                              Estimated Size of Global Cyber Insurance Market
companies: those who
have been hacked,                            PwC                    US$2.5bn in 2014 to US$7.5bn in 2020
and those who don’t                          ABI Research           US$10bn in 2020
yet know they have
been hacked.                                 Lloyds                 US$85bn

John Chambers,                               Some commentators have raised concerns that insurers potentially face an
Executive Chairman and former                aggregated risk from catastrophic cyber attacks that have a systemic impact.
CEO of Cisco                                 Insurers will need to find a balance between providing cyber policies that
                                             address their client’s needs and finding an acceptable level of exposure to their
                                             cyber insurance portfolio. In order to do this, insurers will need to gain a better
                                             understanding of the cyber risk landscape.
                                                                                                                                     3
Cyber insurance: The next frontier

Cyber risk: A growing concern
According to the Allianz Risk Barometer 2016, a survey based on the responses of more
than 800 risk experts from over 40 countries, cyber risk is now a top-three global business
risk and the top long-term risk. This concern is not limited to a specific industry; cyber
risk achieved a top-five ranking in the financial services, manufacturing, power, and
transportation industries.

This increased concern regarding cyber risk is not unfounded. A 2015 UK survey of
664 organisations, conducted by PwC, found that 90 per cent of large organisations and
74 per cent of small businesses suffered a security breach. Closer to home, a 2015 survey
of 149 major Australian businesses across 12 industry sectors found that 50 per cent of
respondents had suffered a breach.

Companies are responding to this growing threat by spending more on information
security. The 2015 ACSC survey found that 56 per cent of respondents reported an
increased expenditure on cyber security. This represents a significant increase from the
2013 survey result of 27 per cent. In a separate estimate in 2015, Gartner predicted that
annual information security spend for Australian companies will grow by 7.4 per cent,
which is well above the 4.7 per cent worldwide growth average.

                                             Top 10 Global Business Risks for 2016
                    Business Interruption                                                                   38%

                   Market Developments                                                               34%

                         Cyber Incidents                                                       28%

    Changes in Legislation and Regulation                                                24%

                   Natural Catastrophes                                                  24%

           Macroeconomic Developments                                                  22%

        Loss of Reputation or Brand Value                                      18%

                          Fire, Explosion                                  16%

             Theft, Fraud and Corruption                           11%

                           Political Risks                         11%

                                             0%      5%      10%         15%     20%     25%   30%   35%    40%

Source: Allianz                              Percentage of Respondents Listing as a Top Risk

                                                                                                                                            4
Cyber insurance: The next frontier

Rising cost of cyber crime
The ‘2015 Cost of Cyber Crime Study: Australia’ is the fourth annual study of
Australian companies conducted by the Ponemon Institute. It found that the average
annualised cost of cyber crime in Australia rose 13 per cent from AU$4.27 million in
2014 to AU$4.9 million in 2015. The 2015 study used a sample of 28 Australian-based
organisations with an annualised cost of cyber crime ranging from AU$0.79 million to
AU$18 million.

Other key findings of the 2015 Cost of Cyber Crime Study included:

Cyber crime costs vary by organisational size with a positive relationship
between organisational size and annualised cost. However, per capita cost for small
organisations was significantly higher than larger organisations ($1,919 versus $372).

Cyber crimes are requiring longer to resolve, with the average time to resolve a
cyber attack now 31 days up from 23 days in 2014. The average cost incurred over this
period has also significantly increased by 47 per cent to AU$419,542.

Cyber crime affects all industries, but to different degrees. Organisations in
the energy and utilities, financial services, and technology industries experienced
substantially higher cyber crime costs than organisations in media, consumer
products, and retail.

                                                                                                                       5
Cyber insurance: The next frontier

Impact by industry
The diagram below summarises the different impacts that cyber attacks have on different industries. When developing policies,
insurers need to recognise that the risk and potential claims from some industries can be substantially greater than for others.

Source: Centre for Internet Safety

  Case Study: Target Breach 2013

  In 2013, Target Corporation suffered a data breach of 40 million payment card information records and 70 million
  personally-identifiable information records. As of December 2015, Target has estimated that it had accrued US$290 million
  in expenses as a result of the breach. Just US$90 million will be covered by insurance.

  The total amount includes a US$67 million settlement of class action lawsuits brought by Visa Inc. on behalf of banks, and other
  issuers of credit and debit cards, a US$10 million settlement with shoppers, and a US$39 million settlement with MasterCard
  and other issuing banks not covered by other class actions.

  Target was reported to have been insured across a number of providers. It was self-insured for US$10 million of cyber coverage
  and held policies of US$15 million with Ace Ltd, US$10 million with American International Group Ltd, US$10 million with
  Axis Capital Holdings Ltd, and US$40 million among four unidentified insurers.

  Target was also reported to have US$60 million of directors’ and officers’ liability (D&O) insurance, of which US$10 million
  was self-insured, US$25 million with American International Group Ltd, US$15 million with Ace Ltd, and US$15 million with The
  Travelers Companies Inc.

                                                                                                                                     6
Cyber insurance: The next frontier

Cyber risk and insurance                                               Cyber risk under traditional insurance cover

Since its inception, insurance has existed to mitigate the             Traditional insurance cover was not designed to protect against
consequences of an adverse event by transferring the risk to a         cyber risk and many underwriters have introduced specific
third party, i.e. the insurer. Cyber risk insurance is no different;   exclusions for losses incurred as a result of a cyber incident. The
it aims to transfer the adverse consequences of a cyber incident       following section examines the treatment of cyber claims under
from the policyholder to the underwriter of the insurance policy.      traditional insurance policies.

Interestingly, 52 per cent of CEOs and CIOs of large UK-based          Property: Damage to software and data as a result of a
organisations thought that their organisation had insurance that       cyber attack is usually not covered as they are deemed to be
would cover them in the event of a cyber breach. However, the          intangible forms of property. Some policies also have specific
percentage of firms with cyber cover (under standalone cover or        exclusions removing cyber attack triggers for physical asset
implicit in other policies) was only 10 per cent. Furthermore, the     damage (e.g. the perils exclusion under s7(a)(ii) of the Mark
actual penetration of standalone cyber insurance products for          IV Industrial Special Risks policies that form the basis of many
UK large businesses was closer to 2 per cent.                          property insurance policies for large businesses).

These results reflect the inadequacy of traditional insurance          Business interruption: Cover is for lost revenue and additional
policies at protecting against cyber risk, and a need for insurers     costs incurred. Most traditional policies are not triggered by
to provide policyholders with a clearer picture of what is covered     cyber attacks that do not cause physical damage.
under existing policies. A better understanding of coverage will       General liability: This covers third-party liabilities for physical
let policyholders make informed decisions about the role of            property damage, bodily injury, and advertising injury. However
insurance in their broader cyber risk-mitigation strategy.             most general liability policies have introduced an exclusion
It is also important for insurers to examine their existing            of coverage for claims arising from unauthorised access or
exposure to cyber risk under their traditional policies and            disclosure of personal information.
include it when examining their appetite for cyber risk.               Errors and omissions/professional indemnity: This cover
This is the case even if the insurer has no intention to provide       is for third-party liabilities arising from the performance of
standalone cyber insurance cover.                                      professional services. Cover may be restricted to liability claims
                                                                       from customers and not affected employees.

                                                                       Terrorism reinsurance scheme: Under the terrorism
                                                                       reinsurance scheme, reinsurance is available to primary insurers
                                                                       for commercial property and associated business interruption
                                                                       loss associated with a declared terrorist incident. However,
                                                                       loss arising from a computer crime is specifically excluded in
                                                                       Schedule 1 of the regulations. Therefore, losses arising from
                                                                       cyber incidents are unlikely to be covered under the terrorism
                                                                       reinsurance scheme.

                                                                                                                                            7
Cyber insurance: The next frontier

Standalone cyber cover

Outside of traditional insurance policies, many insurers now offer extensions to traditional policies and standalone products to cover
the following loss categories. Some of the loss categories below are often bundled together under a cyber policy while others are
optional extras. Some of these losses are completely insurable while others are subject to sub-limits. When underwriting policies,
insurers will need to determine the appropriate mix of these loss categories to cover.

 Loss Category                   Cover
 Data and software loss          The cost of reconstituting data and/or software that has been corrupted or deleted.

 Business interruption           The loss of revenue or additional expenses incurred due to the unavailability of IT systems or data
                                 as a result of cyber attacks or other non-malicious IT failures.
 Cyber extortion                 The cost of expert handling for extortion and the ransom payment.

 Cyber crime                     The direct financial loss arising from the use of computers to commit fraud or theft of money,
                                 securities, or other properties.
 Breach of privacy               The cost to investigate and respond to privacy breaches, notification costs, and fines from
                                 regulators, and third-party liability claims arising from the incident.
 Network failure liabilities     Third-party liabilities arising from a failure of security that causes network systems to be
                                 unavailable to third parties.
 Brand damage                    The loss of revenue arising from an increase in customer churn or reduced transaction volumes
                                 that are directly attributable to the publication of a security breach event.
 Physical asset damage           First-party loss due to destruction of physical property resulting from cyber attacks.

 Death and bodily injury         Third-party liability for death or bodily injury resulting from cyber attacks.

 Intellectual property           The loss of value of an IP asset.
 theft
 Forensic and response
                                 The cost incurred to investigate and resolve the cyber incident and minimise post-incident losses.
 costs

 Legal costs                     The legal cost of defence or settlement of third-party claims.

Recent development in australia

A recent development in the Australian regulatory landscape that is likely to impact the adoption of cyber insurance products is the
mandatory notification requirement proposed under the Privacy Amendment (Notification of Serious Data Breaches) Bill 2015. Under
the proposed scheme, organisations with annual turnover of AU$3 million or more will need to notify affected individuals of a ‘serious
data breach.’

The bill defines a ‘serious data breach’ as one where there is a ‘real risk of serious harm’ to any of the individuals whose information
has been the subject of the breach. Should this Bill be passed, organisations that are subject to a data breach will face increased
costs and reputational damage, which could give organisations more reason to take up cyber insurance cover as part of their risk
mitigation strategy.

Under the current legislation, corporations are liable to fines of up to AU$1.8 million for breaches of the Privacy Act. Mandatory
notification will bring Australia in line with other jurisdictions such as Canada, the European Union, and certain states in the
United States.

                                                                                                                                           8
Cyber insurance: The next frontier

Considerations when developing                                          Analysing the pricing of cyber insurance cover has shown
                                                                        that the rate on line (premium divided by limit of indemnity
cyber insurance                                                         purchased) for the primary layer for cyber insurance (part of the
Given the complexity of cyber risks, there are a number of              policy that pays first in case of a loss) is three times higher than
issues that insurers will need to consider when developing              for general liability cover and six times higher than property. The
their cyber insurance policies. A quick analysis of the existing        pricing for cyber insurance across firms is also much flatter than
products has shown that most insurers offer policies that have          that of general liability and property insurance. Together, these
a similar set of covered items and exclusions. The variance             have a negative impact on cyber insurance, with a higher price
between the policies is in whether sub-limits have been applied         likely to discourage take-up and the lack of price differentiation
to certain loss categories.                                             reducing the incentive for policyholders to improve their security
                                                                        posture to save on premiums.
Individual insurers and the insurance industry as a whole
will need to determine what role they wish to play in the               Understanding risk appetite and risk aggregation
risk management process. By adopting standard terms and
conditions that dictate the security standards policyholders            The non-physical nature of cyber risk and the interconnectedness
need to comply with (e.g. firewalls, hosting locations, etc.),          of the digital world means that a single cyber event can
insurers have the potential to assume a pseudo-regulatory role          affect thousands of policyholders in different geographical
that shapes how businesses manage their cyber risk.                     locations. As a result, an insurer may find themselves subject
                                                                        to catastrophic losses due to the aggregation of risk across
Furthermore, by packaging their insurance product with                  its clients. It is, therefore, important for insurers to understand
incident-response services that mitigate the costs of a breach,         the potential for risk aggregation and clearly understand the
insurers can provide a holistic risk solution to their clients.         possible maximum loss it would face if a systemic event were
                                                                        to occur. This will let insurers balance their exposure with their
Challenges for insurers                                                 appetite for cyber risk.

Lack of historic data                                                   Some have suggested that the aggregation of risk is too great
                                                                        for the private sector and that a government backstop is
A commonly-raised issue regarding the underwriting of cyber             required. However, a recent report suggests that, although the
insurance policies is the lack of historic data on cyber risk.          estimated possible maximum loss of £20 billion for a single cyber
While many surveys regarding the cost of cyber crime have               event is greater than that of a nuclear event, it is well within
been conducted, these surveys sample a selected number of               the £65 billion insurance/reinsurance capacity for a natural
organisations. As a result, the findings are descriptive rather         catastrophe such as a Tokyo or California earthquake.
than normative, and cannot be used as a statistical basis for
actuarial analysis. This lack of data makes it difficult for insurers
to accurately price cyber insurance policies, so many insurers
have tended to take a conservative approach.                                                                                               9
Cyber insurance: The next frontier

Recommendations
Solving the data challenge
The lack of historical data has two broad potential solutions.

Risk management
Throughout the history of developing insurance policies, actuaries have at times been
challenged with the lack of historic data. Underwriters need to recognise that, in the
rapidly-changing threat landscape, historic data is less important than a thorough
understanding of cyber risks, probability, and the ability to mitigate cyber risks.
Underwriters looking to price policies can engage cyber security experts who
understand the threats. IT security experts can provide a security assessment of
potential policyholders. Maturity statements that compare a company’s security
posture against industry standards can be used as inputs in the screening process.
Assessment reports can also include roadmaps for how a policyholder can achieve
industry standards. This has the benefit of reducing risk for the insurer and can
potentially lower premiums for the insured at renewal. For smaller organisations
where the cost of a comprehensive security assessment may be prohibitive, insurers
can work with cyber security experts to develop standard security surveys that can
ascertain the security posture of the policyholder.
In the absence of historical data, some insurers have developed modelling tools based
on Monte Carlo simulations to evaluate the potential loss exposure from cyber risk.

Data pools
Another solution to the data challenge is for the insurance industry to collaborate
and pool anonymised data. By working with government agencies such as the
ACSC, insurance companies can get access to data from reported incidents. A third
potential source of data are cybersecurity providers who will be able to provide
insurers with anonymised data from customer security logs.

Holistic risk solution
Insurance companies have the opportunity to provide a holistic solution to cyber
risk. By bundling ancillary services such as threat intelligence and digital attack
simulations to their cyber risk product, they can offer policyholders additional value
and reduce the likelihood of successful attacks against the insured.
By gathering threat intelligence, insurers can create a threat map that profiles a
client’s position. Following that, insurers could conduct a risk assessment. This may
include activities such as penetration testing, security audits, and white hat hacking
campaigns to get a clear view of the client’s risk profile. As a final step, ongoing
training is essential for the insurer, the brokers they work with, and for clients, who
may be entitled to reduced premiums if they have certain requirements in place such
as security certifications and accreditations.
In the event of a cyber breach, it is in the insurer’s and insured’s best interests to
mitigate the losses arising from the attack. However, the vast majority of organisations
do not have the adequate expertise to handle a cyber incident effectively to minimise
damage. Therefore it is necessary to engage an incident response team that can be
deployed to manage the adverse consequences of a breach.

                                                                                      10
Cyber insurance: The next frontier

An independent third party will also need to be engaged to provide post-incident
investigation. At this stage, the cyber security expert will operate as a claims
assessor, gathering evidence and determining the root cause of the incident, as well
as expected and covered losses, and costs of the breach.

                Assess                                 Support                          Respond

                                     During Coverage
 Pre Coverage

                                                                        Post Incident
                Policy and Product                     Prevention and                   Forensics
                Development                            Defence
                                                                                        Claims
                Maturity                                                                Assessment
                Assessment

Conclusion
Cyber insurance is an emerging product that is likely to grow exponentially over
the next few years. In fact, it is likely to grow much faster than other insurance
products such as automobile, life, or home and contents insurance. Once people
and businesses genuinely understand the scope and severity of the threat they are
exposed to, demand is likely to accelerate rapidly. Insurers looking to capitalise on
this new revenue stream will need to act swiftly and develop a strategy around cyber
insurance. A thorough understanding of cyber risk and a partnership with cyber
security experts will be critical to success.
While insurers may look to hire these skills in-house, this approach could be hindered
by the ongoing shortage of cyber security skills in the market. The other option is for
insurers to partner with organisations that can provide the insight and advice that
they need with policy development and claims assessment.

                                                                                                     11
Cyber insurance: The next frontier

  References
  Allianz, Allianz Risk Barometer Top Business Risks 2016, January 2016

  Australian Cyber Security Centre, 2015 Cyber Security Survey: Major Australian Businesses, December 2015

  Australian Government and Australian Reinsurance Pool Corporation, Cyber Terrorism and Australia’s Terrorism Insurance
  Scheme: Physical Destructive Cyber Terrorism is a Gap in Current Insurance Coverage, March 2016

  CERT Australia, Cyber Crime & Security Survey Report 2013, May 2014

  Fitch, The Rise of Cyber Insurance: Growth Opportunity Paired with Incalculable Threat, March 2015

  Gartner, Forecast Analysis: Information Security Worldwide, 2Q15 Update, September 2015

  Greenwald J, ‘Target has $100M of cyber insurance, $65M of D&O cover: Sources’, Business Insurance, 14 January 2014,
  Accessed 18 February 2016, http://www.businessinsurance.com/article/20140114/NEWS07/140119934

  HM Government and Marsh, UK Cyber Security: the role of insurance in managing and mitigating the risk, March 2015

  Insurance Information Institute, Cyber Risk: Threat and opportunity, October 2015

  Liew R, ‘Aon finds cyber insurance a booming trade as hacks spike’, Australian Financial Review, 14 September 2015, Accessed
  18 Feb 2016, http://www.afr.com/technology/aon-finds-cyber-insurance-a-booming-trade-as-hacks-spike-20150910-gjjk20

  Ponemon Institute, 2015 Cost of Cyber Crime: Australia, September 2015

  PricewaterhouseCoopers, Information Security Breaches Survey 2015, June 2015

  PricewaterhouseCoopers, Insurance 2020 & beyond: Reaping the dividends of cyber resilience, September 2015

  PricewaterhouseCoopers, Top Issues The promise and pitfalls of cyber insurance, January 2016

  Stempel J and Rose N, ‘Target in $39.4 million settlement with banks over data breach’, Reuters, 2 December 2015, Accessed
  18 Feb 2016, http://www.reuters.com/article/us-target-breach-settlement-idUSKBN0TL20Y20151203

  Stewart E, ‘Cyber attack insurance growing fast’, ABC News, 9 October 2015, Accessed 18 February 2016,
  http://www.abc.net.au/news/2015-10-09/cyber-attack-insurance-growing-fast/6842744

                                            About DXC
                                            DXC Technology (NYSE: DXC) is the world’s leading independent, end-to-end IT services company, helping
                                            clients harness the power of innovation to thrive on change. Created by the merger of CSC and the Enterprise
                                            Services business of Hewlett Packard Enterprise, DXC Technology serves nearly 6,000 private and public
                                            sector clients across 70 countries. The company’s technology independence, global talent and extensive
                                            partner alliance combine to deliver powerful next-generation IT services and solutions. DXC Technology is
                                            recognized among the best corporate citizens globally. For more information, visit www.dxc.technology.

www.dxc.technology                          © 2017 DXC Technology Company. All rights reserved.                              DXC_CSC-363. March 2017
You can also read