Email
Newsletters
R&I ONE®
(weekly)
The best articles from around the web and R&I, handpicked by R&I editors.
WORKERSCOMP FORUM
(weekly)
Workers' Comp news and insights as well as columns and features from R&I.
RISK SCENARIOS
(monthly)
Update on new scenarios as well as upcoming Risk Scenarios Live! events.

An Inevitable Threat

Cyber: The New CAT

Cyber risk is a foundation-level exposure that should be viewed similar to a company’s property, liability or workers’ comp risks.
By: and | April 7, 2014 • 6 min read
R4-14p26-28_IntroER.indd

Superstorm Sandy. The Joplin tornado. The Japanese earthquake and tsunami. California wildfires. 9/11. Catastrophes come in many forms. It is universally understood that despite our best efforts, disaster can strike due to forces beyond our control. Cyber threats are equally dangerous and diverse — and just as unstoppable.

Yet even as catastrophe risk management matures and scores of executives join the catastrophe conversation, the dragon known as cyber risk still sits in the middle of the board room, quietly smoldering.

Advertisement




In every industry and at every company size, cyber risk is a foundation-level exposure that every business must confront — one that must be viewed with the same gravity as a company’s property, liability or workers’ comp risks.

As recent as a decade ago, that might have been an overstatement. But not now. Technology and business are fundamentally linked. Computers and the Internet are the primary platform for communicating with customers and vendors, managing profits and expenses, paying employees, operating the machines that produce goods and provide services, and making sure that the end product gets into customers’ hands on schedule. Mobile technology and the Internet of Things are opening new channels, making technology a physical extension of ourselves, both personally and commercially.

“The entire economy is so reliant, in ways that we don’t even see, on technology and the storage, transmission and usage of data, both personal and for analytical purposes, that it’s fundamental to almost every sector,” said Oliver Brew, vice president for professional, privacy, and technology liability at LIU Liberty International Underwriters, the specialty line division of Liberty Mutual in New York.

Video: Computer security expert Mikko Hyppönen explains how he tracked down the creators of the first PC virus, which hit the net 25 years ago, and how to stop the new viruses of today.

That reliance is only going to grow. A January report by Forrester Research described software assets as more critical to business success than financial assets over the next 20 years.

“If you take a look at the public companies’ 10-Ks and publicly disclosed statements, what are they emphasizing that’s going to differentiate them from their competitors, increase sales, decrease costs and maximize efficiency? They focus on the use of technology and the use of information assets,” said Kevin Kalinich, global practice leader for cyber and network risk at Aon Risk Solutions.

With increased technology comes increased opportunity for attack. However, that reality didn’t get a lot of traction in the C-suite until the recent Target breach splashed it across world headlines. Even now, there are still some resting easy, confident that their IT teams have everything under control. Others assume cyber attacks are a threat largely confined to industries such as retail, health care and financial services — sectors with the most data to lose.

Advertisement




Small businesses, in particular, downplay the risk, said Jesse Bessler, an account executive at Lacher & Associates, of Souderton, Pa. “I think it’s that they just don’t understand the risk, and they think that [a cyber policy] is an add-on item they don’t need.”

Increased Sophistication

Security experts, however, are trying to break through the wall of denial. Cyber attacks, they argue, are akin to massive storms or similar to the focused destruction of a tornado — something you can prepare for, but not something you can prevent. Despite firewalls and antivirus programs, experts say, cyber punches will eventually land inside every company.

To grasp the magnitude of the threat, it’s important to recognize that the driving forces behind cyber crime are vast, varied and as uncontrollable as any atmospheric or geologic force. The threat is now ubiquitous, and experts agree that while making an effort to reduce the risk of a breach is important, it is no longer possible to completely prevent cyber attacks.

Kurtis Suhs Ironshore

Kurtis Suhs
Vice President
Ironshore

“It’s like two identical cars in a mall parking lot,” explained Kurtis Suhs, vice president and national technology and privacy product manager for Ironshore. “If one’s locked and one’s unlocked, the bad guy’s going to go to the unlocked car. But if the bad guy really wants to get into the locked car, he will — it’ll just take longer.”

And yet, organizations keep brushing off the threat. That may be because “cyber risk” has become synonymous with data theft. If an entity does not have a significant aggregation of customer financial data, executives assume they won’t be targeted. The reality is that the true exposure is no longer just about credit card or Social Security data. Hackers have expanded their target list, adopted a more patient approach and found deep-pocketed sponsors, whether private-sector or state-sponsored, security experts said.

Sophisticated hackers are conducting long-term surveillance and probing for weaknesses they can exploit for financial gain, said David Remnitz, global and Americas leader of Ernst & Young’s forensic technology and discovery services business. “The end result here is the theft of highly valuable, internal information for significant financial gain,” he said.

While that could mean outright theft of trade secrets or confidential M&A data, it could also mean corporate sabotage, as in corrupting a decade of research and development results or putting competitors out of business. Imagine a market where most of the players used one primary vendor as a source for a key ingredient. An organization could contract with a lesser-used source for that ingredient, then disrupt the operations of the primary vendor via a denial-of-service attack or other type of malware, leaving the rest of the market scrambling for suppliers.

The potential for lost business and liability claims could be devastating for the affected companies. Even those with solid business continuity plans in place could still take heavy hits from the reputational fallout.

Advertisement




“A large company might be able to absorb that risk. A small company can’t,” said Elissa Doroff, a vice president and senior advisory specialist in Marsh’s network security and privacy practice in New York.

To date, breaches have largely been limited to individual companies, but the potential for larger events looms. One concern centers on cloud companies, which could host data for hundreds of businesses. A data breach or network interruption, or the physical destruction of a cloud-service data center could wreak larger havoc on the economy.

“That’s a potentially catastrophic loss,” said Doroff.

The sky’s the limit at this point. Criminals are capable of disrupting a multinational corporation, a transportation or logistics network, a health care system, an entire industry or even an entire region, creating havoc and leading to economic losses in the millions or billions — in many situations even putting lives at risk.

Keep in mind that those with ill intent don’t even need to have an IT background — the proliferation of hackers-for-hire means that anyone intent on doing damage can do so if their pockets are deep enough.

That said, it probably wouldn’t take a well-funded ring of genius-level hackers and a sophisticated attack plan to paralyze the average organization. Three years ago, the U.S. subsidiary of Shionogi, a Japanese pharmaceutical firm, suffered a devastating cyber attack that deleted the contents of 88 computer servers, crippling the company’s operations for several days, disabling its email, BlackBerry servers, order-tracking system, and financial management software. The attacker? A former mid-level employee, working from a public
Wi-Fi network at a nearby McDonalds, calmly sipping coffee while bringing Shionogi to its knees.

An Enterprise Approach

Even organizations that have never been affected by a catastrophe generally do not question the need for CAT planning. At the very least, most probably have a written evacuation plan in place and enough insurance to cover the potential physical damage of a storm. The smartest also address the whole picture from a supply chain and business continuity standpoint, and may have even considered questions about how to manage any reputational damage related to interruption of service to customers.

PwC’s report, Cyber Crisis Management: A Bold Approach to a Bold and Shadowy Nemesis, offers a new philosophy and approach to incidence response. This graphic shows the key elements of a structured cyber crisis response.

PwC’s report, Cyber Crisis Management: A Bold Approach to a Bold and Shadowy Nemesis, offers a new philosophy and approach to incidence response. This graphic shows the key elements of a structured cyber crisis response.

Cyber exposure should be approached in much the same way. It starts with engineering out the risk to whatever extent possible. If your roof is old, for instance, replacing it may be a way to ensure the building is more likely to stay intact if it’s battered by a storm. The cyber equivalent might be replacing old servers or upgrading any existing automated intrusion detection system. Security experts stress, however, that cyber risk is not an IT exposure, it’s an enterprisewide exposure. Therefore vulnerabilities need to be identified across an entire organization, with policies and procedures modified accordingly.

A comprehensive, enterprisewide disaster plan can also go a long way toward helping companies minimize the damage sustained in the event of a cyber attack. For every function of an organization, management needs to ask hard questions about how a cyber attack could disrupt that function, and what kind of back-up plan each department would need. Do you have a way to contact customers and suppliers if your email goes down? Do you have a crisis communication plan for alerting the public about how you’re handling the situation? Are your records backed up and accessible through a secure third-party?

Advertisement




Increasingly, organizations will rely on insurance to ensure their survival after a cyber event. In a February survey by BAE Systems, nearly 30 percent of companies said they expected the cost of a cyber attack to exceed $75 million. Another 20 percent expected the cost to fall between $15 million and $75 million.

“There’s an expectation that this could have an extremely material effect on business performance, and that’s a risk they look to hedge,” said Paul Henninger, global product director for BAE Systems Applied Intelligence, a business unit of BAE Systems.

Taking a realistic approach to cyber attacks could improve underwriting of the risk, he said. Just as carriers evaluate whether clients are prepared for a CAT-5 hurricane, knowing some damage is likely, they could determine whether clients are ready for a cyber storm.

“You can’t make it go away, but you can minimize the impact on the bottom line and customers and reputation,” he said.

                                                                                                                     

Complete coverage on the inevitable cyber threat:

Risk managers are waking up to the reality that the cyber risk landscape has changed. Every sector must prepare to withstand the storm.

042014_02c_hospital_thumbnailCritical Condition. The proliferation of medical devices creates a host of scary risks for the beleaguered health care industry.

042014_03c_cars_thumbnailDisabled Autos. It’s alarmingly easy for a hacker to take control of a driverless vehicle, tampering with braking systems or scrambling the GPS.

Alaska Plane CrashUnmanned Risk. The dark side of remote-controlled drones, which have already been hacked — by students.

dv738024An Electrifying Threat. There is a very real possibility hackers could devastate the nation’s power grids — for a potentially extended period of time.

Michelle Kerr is associate editor of Risk & Insurance. She can be reached at mkerr@lrp.com
Share this article:

Cyber Threat: Energy

An Electrifying Threat

The energy sector is a top target of cyber attackers. A successful attack is only a matter of “when.”
By: and | April 7, 2014 • 7 min read
042014_05c_rigs

Energy and the natural resources industry face especially grim cyber threats.

“If there is a cyber attack, you can’t see or touch that attacker so your ability to quickly respond may or may not be successful,” said Norma Krayem, a senior policy adviser at the Patton Boggs law firm and co-chair of the firm’s homeland security, defense and technology transfer practice group.

Advertisement




“I think the likelihood of such an attack absolutely exists,” she said. “I think the question becomes more about who, when and why.”

According to Symantec, a data security company, the energy sector “has become a major focus for targeted attacks and is now among the top five most targeted sectors worldwide.”

The threats may come from competitive spying, corporate espionage, cyber criminals, hacktivism, disgruntled employees and state-sponsored disruptions, it said.

A bad result doesn’t even necessarily have to begin with bad intent, said Cliff Lancaster, senior risk analyst at Hartford Steam Boiler Inspection and Insurance Co. (HSB).

At the Davis–Besse Nuclear Power Station in Ohio, for example, the network became infected with a worm that shut it down for five hours in 2003 because a software consultant had created a shortcut for his own convenience that bypassed the firewall, he said.

Possible Widespread Devastation

As security measures increase, employees and vendors may be ever more tempted to bypass procedures, just to more easily get their work done.

Between July 2012 and June 2013, 16 percent of all cyber attacks each day targeted companies in the energy sector, according to Symantec. Only the government or public sector had more targeted attacks.

And should the energy delivery system be disrupted, that threatens the country’s finance, transportation, health care, water supply and emergency services systems — all of which depend on reliable energy.

042014_05c_rigs_Krayem“You have this patchwork of systems that are being cobbled together, a lot of them are legacy systems, and they are not necessarily all at the same level of security.”

– Norma Krayem, senior policy adviser, Patton Boggs

Electric grid vulnerabilities that lead to power disruptions are estimated to cost the U.S. economy between $119 billion to $188 billion each year, according to a 2013 report on grid vulnerability by Rep. Edward J. Markey, D-Mass., and Rep. Henry A. Waxman, D-Calif.

“Power disruptions today generally do not lead to insured losses,” said Robert Hartwig, president of the Insurance Information Institute.

“However, it seems only a matter of time before a major cyber attack leads to the type of damage covered by standard property and liability policies,” he said.

“As we look at what hackers have been able to do in terms of infiltrating presumed secure systems — even entities like the Department of Defense — it seems there must be vulnerabilities in the systems associated with major infrastructure in this country, whether it’s electric, water, transportation or communications.”

Complex Risk Management

The degree to which computer technology and networking are integral to the energy sector in an operational sense makes it a particularly complex risk-management challenge, said John Kerns, executive managing director of Beecher Carlson Financial Services.

Advertisement




“There was a question posed to us by a client earlier this year: What if there were a denial-of-service attack or virus that shut down the gas pipelines coming into Chicago in the middle of winter. Homes went cold and people went to the hospital or even died. There was no physical damage, but clearly there was a serious impact, and loss,” he said.

The challenges are not confined to traditional energy markets either, said Charles Long, vice president of renewable energy and green technology at William Gallagher Associates. “Many computers are covered under a basic commercial package, and wind farms have separate coverage. If there is a lightning strike, that is surely covered. If data just failed, that can be covered by E&O, but data corruption or a virus, that kind of thing is very much still under consideration.”

Fred Podolsky, executive vice president, executive risk, Alliant Insurance Services, said that “only a small fraction,” maybe 10 percent of U.S. based utility companies have bought cover, and most of the policies that have been purchased relate to data breach exposures.

Some companies, however, have “woken up and are looking for cover” to help them repair their power-generation network and computer systems should they be damaged, or to protect them from other service interruption or customer liability issues, he said.

But many utilities refuse to provide underwriters with sufficient information to get the coverage they need, he said.

The main reason? “It’s just a pure confidentiality concern. IT folks are just so fearful to release any information to anyone having to do with their security procedures, though pressure is building from risk management and others in the C-suite to address these exposures,” Podolsky said.

While protecting the actual control systems of energy companies is a high priority that is audited by the federal government, the smart grid — that measures and creates a more efficient distribution of electricity based on use — is  vulnerable, said HSB’s Lancaster.

If false data were injected into that system, it could potentially cause turbine generators to speed up when they shouldn’t. “If you can get it spinning at the wrong speed,” he said, “it can just shake itself to death.”

Once a turbine or transformer is damaged, there is a limited amount of replacement equipment.

And once a turbine or transformer is damaged, there is a limited amount of replacement equipment, he said. “If you are able to damage many pieces of equipment at once, it would take a lot of time to fix it because you have to build and rebuild lots of equipment,” Lancaster said.

Krayem said the connectivity of entities that distribute electric power, for example, means there could be “cascading failures” throughout the country.

Advertisement




“You have this patchwork of systems that are being cobbled together, a lot of them are legacy systems, and they are not necessarily all at the same level of security,” she said.

According to KPMG, which cited data from the U.S. Department of Homeland Security, the “constant barrage of cyber attacks” on water and energy companies “usually take the form of cyber espionage or denial-of-service attacks against industrial-control systems.”

Inadequate Security Controls

The consultancy also noted that a survey by The Centre for Strategic and International Studies in 2010, found that critical infrastructure, including power grids, industrial control networks and oil refineries “are not adequately prepared to defend themselves.”

Video: Dissecting Stuxnet

The most famous of all attacks on an energy system occurred in Iran when unknown forces — believed to be the United States and Israel — created the Stuxnet worm, specially designed to target Iran’s specific industrial control system and reprogram it so that the nuclear centrifuges spun out of control and damaged themselves while the displays indicated normal functioning.

Most notably, Stuxnet spread using a USB drive, infecting networks that were unreachable by the Internet.

Another disturbing attack occurred in 2012, when a cyber attack hit Saudi Aramco, one of the largest oil producers in the world. The disruption, which continued for two weeks, disabled more than 30,000 of the company’s workstations.

The virus, later named “Shamoon,” was the first significant cyber attack on a commercial target to cause real damage. It is also the most destructive attack the private sector has experienced to date, said Malcolm Marshall, global leader for information protection at KPMG, based in London.

Marshall said that “one senior oil-industry executive to whom I spoke shortly after the Shamoon incident told me, ‘Well, there goes our worst-case scenario.’ ”

That same month, Rasgas, in Qatar, was hit by the same virus and forced to bring its entire network off line.

In 2011, hackers were able to install malware and “evidence of a sophisticated threat actor” was found in the U.S. energy sector, according to the U.S. Government Accountability Office.

An Active Market

Marshall noted that, in the aggregate, the global oil and gas industry “is effectively self-insured, but cyber security is an active and growing commercial market, especially in the U.S. It seems likely that will become an economic necessity.”

Kerns at Beecher Carlson said, “We are seeing multiple policies responding to these threats. Those include dedicated cyber policies, D&O coverage, and in the energy sector, even general liability policies are responding.”

Advertisement




That said, he added that “the insurance market is looking aggressively at cyber risk, and is putting on new exemptions, restrictions, and limits. The gray areas are still some GL, bodily injury, and third-party injury. Mostly, we are seeing GL carriers not willing to pick up many risks. That leaves owners and brokers to see what the cyber market is willing to do.
“There is capacity to address business interruption, but we are having to press on bodily injury and property damage as they relate to cyber,” he said.

                                                                                                                    

Complete coverage on the inevitable cyber threat:

Risk managers are waking up to the reality that the cyber risk landscape has changed.

Cyber: The New CAT. It’s not a matter of if, but when. Cyber risk is a foundation-level exposure that must be viewed with the same gravity as a company’s property, liability or workers’ comp risks.

042014_02c_hospital_thumbnailCritical Condition. The proliferation of medical devices creates a host of scary risks for the beleaguered health care industry.

042014_03c_cars_thumbnailDisabled Autos. It’s alarmingly easy for a hacker to take control of a driverless vehicle, tampering with braking systems or scrambling the GPS.

Alaska Plane CrashUnmanned Risk. The dark side of remote-controlled drones, which have already been hacked — by students.

Anne Freedman is managing editor of Risk & Insurance. She can be reached at afreedman@lrp.com.
Share this article:

Sponsored: Lexington Insurance

What Is Insurance Innovation?

When it comes to E&S insurance, innovation is best defined as equal parts creativity and speed.
By: | April 7, 2014 • 4 min read

SponsoredContent_LexingtonTruly innovative insurance solutions are delivered in real time, as the needs of businesses change and the nature of risk evolves.

Lexington Insurance exemplifies this approach to innovation. Creative products driven by speed to market are at the core of the insurer’s culture, reputation and strategic direction, according to Matthew Power, executive vice president and head of strategic development at Lexington, an AIG Company and the leading U.S.-based surplus lines insurer.

“The excess and surplus lines sector is in a growth mode due, in no small part, to the speed at which our insureds’ underlying business models are changing,” Power said. “Tomorrow’s winning companies are those being built upon true breakthrough innovation, with a strong focus on agility and speed to market.”

To boost its innovation potential, for example, Lexington has launched a new crowdsourcing strategy. The company’s “Innovation Boot Camps” bring people together from the U.S., Canada, Bermuda and London in a series of engagements focused on identifying potential waves of change and market needs on the coverage horizon.

“Employees work in teams to determine how insurance can play a vital role in increasing the success odds of new markets and customers,” Power said. “That means anticipating needs and quickly delivering programs to meet them.”

An example: Working in tandem with the AIG Science team – another collaboration focused on innovation – Lexington is looking to offer an advanced high-tech seating system in the truck cabs of some of its long-haul trucking customers. The goal is to reduce driver injury and fatigue-based accidents.

SponsoredContent_Lexington“Our professionals serving the healthcare market average more than twenty years of industry experience. That includes attorneys and clinicians combining in a defense-oriented claims approach and collaborating with insureds in this fast-moving market segment. At Lexington, our relentless focus on innovation enables us to take on the risk so our clients can take on the opportunities.”
– Matthew Power, Executive Vice President and Head of Regional Development, Lexington Insurance Company

Power explained that exciting growth areas such as robotics, nanotechnology and driverless cars, among others, require highly customized commercial insurance solutions that often can be delivered only by excess and surplus lines underwriters.

“Being non-admitted, our freedom of rate and form allows us to be nimble, and that’s very important to our clients,” he said. “We have an established track record of reacting quickly to trends and market needs.”

Lexington is a leading provider of personal lines coverage for the excess and surplus lines industry and, as Power explains, the company’s suite of product offerings has continued to evolve in the wake of changing customer needs. “Our personal lines team has developed a robust product offering that considers issues like sustainable building, energy efficiency, and cyber liability.”

Most recently the company launched Evacuation Response, a specialty coverage designed to reimburse Lexington personal lines customers for costs associated with government mandated evacuations. “These evacuation scenarios have becoming increasingly commonplace in the wake of recent extreme weather events, and this coverage protects insured families against the associated costs of transportation and temporary housing.

The company also has followed the emerging cap and trade legislation in California, which has created an active carbon trading market throughout the state. “Our new Carbon ODS product provides real property protection for sequestered ozone depleting substances, while our CarbonCover Design Confirm product insures those engineering firms actively verifying and valuing active trades.” Lexington has also begun to insure new Carbon Registries as they are established in markets across the country.

Lexington has also developed a number of new product offerings within the Healthcare space. The Affordable Care Act has brought an increased focus on the continuum of care and clinical patient safety. In response, Lexington has created special programs for a wide range of entities, as the fast-changing healthcare industry includes a range of specialized services, including home healthcare, imaging centers (X-ray, MRI, PET–CT scans), EMT/ambulances, medical laboratories, outpatient primary care/urgent care centers, ambulatory surgery centers and Medical rehabilitation facilities.

“The excess and surplus lines sector is in growth mode due, in no small part, to the speed at which our insureds’ underlying business models are changing,” Power said.

Apart from its coverage flexibility, Lexington offers this segment monthly webcasts, bi-monthly conference calls and newsletters on key risk issues and educational topics. It also provides on-site risk consultation (for qualifying accounts), access to RiskTool, Lexington’s web-based healthcare risk management and patient safety resource, and a technical staff consisting of more than 60 members dedicated solely to healthcare-related claims.

“Our professionals serving the healthcare market average more than twenty years of industry experience,” Power said. “That includes attorneys and clinicians combining in a defense-oriented claims approach and collaborating with insureds in this fast-moving market segment.”

Power concluded, “At Lexington, our relentless focus on innovation enables us to take on the risk so our clients can take on the opportunities.”

This article was produced by Lexington Insurance Company and not the Risk & Insurance® editorial team.


Lexington Insurance Company, an AIG Company, is the leading U.S.-based surplus lines insurer.
Share this article: