Cyber Security and Cyber Liability Insurance
Total Page:16
File Type:pdf, Size:1020Kb
Cyber Security and Cyber Liability Insurance Wednesday, July 7, 2021 WEBCAST Speaker: Brandon Gordon Brandon Gordon is a proud Iowa State University Alumni and President of Run Networks, a Managed IT Services company based in Omaha, Nebraska. He started Run Networks in 2007 and has over 20 years of experience in business IT. Brandon encourages his IT team to follow the company’s core values of being passionate about IT services and providing those services with value and efficiency. When Brandon is not at his computer saving the business world, he is under the hood of his 1968 MG tuning carburetors. He and his wife, Sarah have been married since 2001 and have 3 girls. Brought to you by This page intentionally left blank. 7/7/2021 CYBER SECURITY AND CYBER LIABILITY INSURANCE JULY 7 2021 12:00-1:00 RUN NETWORKS, MERCER 1 Cyber Liability Insurance Cyber liability applications are in depth with some questions that can be confusing. In this session we will walk through some sample questions we see on cyber insurance applications and discuss how they apply to a firm, and review some options to fulfill that requirement. 2 1 7/7/2021 Introductions • Caroline Murray – McGowan Program Administrators • John Collentine - Mercer • Mark Kollar – McGowan Program Administrators • Brandon Gordon – Run Networks 3 IMPORTANT – CYBERPRO POLICY STATEMENT OF FACT • By accepting this insurance you confirm that the facts contained in the proposal form are true. These statements, and all information you or anyone on your behalf provided before we agree to insure you, are incorporated into and form the basis of your policy. If anything in these statements is not correct, we will be entitled to treat this insurance as if it had never existed. You should keep this statement of fact and a copy of the completed proposal form for your records. This application must be signed by the applicant. Signing this form does not bind the company to complete the insurance. With reference to risks being applied for in the united states, please note that in certain states, any person who knowingly and with intent to defraud any insurance company or other person submits an application for insurance containing any false information, or conceals the purpose of misleading information concerning any fact material thereto, commits a fraudulent insurance act, which is a crime. The undersigned is an authorized principal, partner, director, risk manager, or employee of the applicant and certifies that reasonable inquiry has been made to obtain the answers herein which are true, correct and complete to the best of his/her knowledge and belief. Such reasonable inquiry includes all necessary inquiries to fellow principals, partners, directors, risk managers, or employees to enable you to answer the questions accurately. 4 2 7/7/2021 REFERENCE CONTROL: INFORMATION SECURITY POLICIES Management Direction for Information Security 5 Records • Do you collect, store, host, process, control, use or share any private or sensitive information* in either paper or electronic form? • *Private or sensitive information includes any information or data that can be used to uniquely identify a person, including, but not limited to, social security numbers or other government identification numbers, payment card information, drivers’ license numbers, financial account numbers, personal identification numbers (pins), usernames, passwords, healthcare records and email addresses. 6 3 7/7/2021 Records • Do you collect, store, host, process, control, use or share any biometric information or data, such as fingerprints, voiceprints, facial, hand, iris or retinal scans, DNA, or any other biological, physical or behavioral characteristics that can be used to uniquely identify a person? • Approximately how many PII’s are retained within your computer network, databases and records? (PII is defined as a personally identifiable record on an individual that can be used to identify, contact or locate a single individual) 7 REFERENCE CONTROL 6: ORGANIZATION OF INFORMATION SECURITY Internal Organization Mobile Devices and Teleworking 8 4 7/7/2021 IT Department • This section must be completed by the individual responsible for the applicant’s network security. As used in this section only, “you” refers to the individual responsible for the applicant’s network security. • Who is responsible for the Applicant’s network security? 9 REFERENCE CONTROL 7: HUMAN RESOURCE SECURITY Prior to Employment During Employment Termination and Change of Employment 10 5 7/7/2021 Human resource Security • Administer a corporate-wide policy governing security, privacy, and acceptable use of company property for all employees? • Perform background checks on all employees and contracts with access to sensitive data? 11 REFERENCE CONTROL 8: ASSET MANAGEMENT Responsibility for Assets Information Classification Media Handling (physical) 12 6 7/7/2021 REFERENCE CONTROL 9: ACCESS CONTROL Business Requirements of Access Control User Access management User Responsibilities System and Application Access Control 13 Authentication • Do you use multi-factor authentication (MFA) to secure all cloud provider services that you utilize (e.g. Amazon web services (AWS), Microsoft Azure, google cloud)? • Do you use MFA to protect access to privileged user accounts? • Does you provide your users with password management software? • Require users to change passwords on at least a quarterly basis? • Requirestrong passwords for administrator rights 14 7 7/7/2021 REFERENCE CONTROL 10: CRYPTOGRAPHY Cryptographic Controls 15 Encryption • Indicate whether the Applicant encrypts private or sensitive data: • a. While at rest in the Applicant’s database or on the Applicant’s network • b. While in transit in electronic form • c. While on mobile devices • d. While on employee owned devices • e. While in the care, custody, and control of a third party service provider 16 8 7/7/2021 Encryption • Is all sensitive and confidential information stored on your databases, servers and data files encrypted? • Is all information held in a physical form disposed of or recycled by confidential and secure methods? • If you have answered ‘No’ to question b, please detail the type and how much PII is stored on portable media devices and how it is protected in the absence of encryption. • Do you use a cloud provider to store data or host applications? If you use more than one cloud provider to store data, please specify the cloud provider storing the largest quantity of sensitive customer and/or employee records (e.g., including medical records, personal health information, social security numbers, bank account details and credit card numbers) for you. 17 REFERENCE CONTROL 11: PHYSICAL AND ENVIRONMENTAL SECURITY Secure Areas Equipment 18 9 7/7/2021 Physical and Environmental Security • Have physical security to control access to data cetners / server rooms? • Enforce a clear desk policy at all sites? • Have an enterprise-wide data retention and destruction policy? 19 REFERENCE CONTROL 12: OPERATIONS SECURITY Operational Procedures and Responsibilities Protection from Malware Backup Logging and Monitoring Control of Operational Software Technical Vulnerability Management Information Systems Audit Considerations 20 10 7/7/2021 Operations Security Ransomware Controls • Do you pre-screen emails for potentially malicious attachments and links? • If “Yes”, do you have the capability to automatically detonate and evaluate attachments in a sandbox to determine if they are malicious prior to delivery to the end-user? • Can your users access email through a web application or a non-corporate device? • If “Yes”, do you enforce MFA? • Do you have up-to-date, active firewall technology? • Intrusion prevention or detection solution in place? • Monitor Active Directory to detect unusual activity or abnormal behavior? 21 Do you allow remote access to your network? • If “Yes”: • (1) Do you use MFA to secure all remote access to your network, including any remote desktop protocol (RDP) connections? • If MFA is used, please select your MFA provider: • If “Other”, please provide the name of your MFA provider 22 11 7/7/2021 Antivirus and Updates • Do you have a process in place to regularly download and install patches? • In what time frame do you install critical and high severity patches across your enterprise? • Do you have up-to-date, active anti-virus software on all computers, networks, and mobile devices? • Do you use a next-generation antivirus (NGAV) product to protect all endpoints across your enterprise? If “Yes”, please select your NGAV provider: • Do you use an endpoint detection and response (EDR) tool that includes centralized monitoring and logging of all endpoint activity across your enterprise? 23 Do you use a data backup solution? • How frequently does it run? • Estimated amount of time it will take to restore essential functions in the event of a widespread malware or ransomware attack within your network? • Please check all that apply: • Backups are encrypted. • Backups are kept separate from your network (offline/air-gapped), or in a cloud service designed for this purpose. • Backups are secured with different access credentials from other administrator credentials. 24 12 7/7/2021 Backup Solution Continued • You utilize MFA to restrict access to your backups. • You use a cloud-syncing service (e.g. Dropbox, OneDrive, SharePoint, Google Drive) for backups. • Your cloud-syncing service is protected by MFA. • You have tested the successful restoration and recovery of key server