SlideShare a Scribd company logo
1 of 4
Download to read offline
PIB	Insurance	Brokers	present:
Cyber	Risks	&	Liabilities
September/October
How	GDPR	Will	Expand	Your	D&O	Liability	
The	forthcoming	GDPR	may	place	greater	
responsibility	on	your	organisation’s	directors	
and	officers,	and,	for	that	reason,	it	is	important	
to	take	proactive	steps	now	to	prepare.	
Are	You	Prepared	for	Silent	Exposures	from	
Cyber-attacks?	
‘Silent	cyber’	exposure	refers	to	potential	cyber-
related	losses	due	to	insurance	policies	that	are	
not	specifically	designed	to	cover	cyber-risks.	
Learn	how	you	can	safeguard	your	organisation	
from	these	types	of	exposures	with	this	beneficial	
guidance.		
Recent	Cyber-security	News		
and	Prosecutions	
Read	about	how	experts	claim	that	80	per	cent	of	
cyber-attacks	are	preventable,	why	a	password	
expert	regrets	his	previous	advice	and	take	a	
peek	at	the	ICO’s	new	blog	series.	
	
	How	GDPR	Will	Expand	Your	D&O	Liability	
On 25 May 2018, the General Data Protection Regulation (GDPR)
comes into effect, which expands the rights of individuals and their
data while placing greater obligations on organisations that process
personal data.
As cyber-related requirements become more stringent under the
GDPR and directors and officers (D&Os) shoulder more liability than
ever before, industry experts are wondering whether D&Os will soon
be held personally liable for cyber-breaches or neglecting to prioritise
cyber compliance. D&Os who disregard their responsibility to ensure
an organisation-wide commitment to the GDPR and cyber compliance
could face legal action after a data breach. In fact, there have been
four cases brought against directors in the United States for cyber-
attacks, including Target and Home Depot executives.
In order to ensure that your organisation’s directors and officers are
prepared for the new responsibilities placed upon them by the GDPR,
consider making the following revisions:
• Ensure your D&O liability policy does not contain any specific
exclusions about data breaches.
• Prioritise cyber-security at the highest level of your organisation by
building cyber-governance into your organisational structure.
Emphasise that cyber-security and GDPR compliance is the entire
organisation’s concern, from the board members all the way down
to the interns.
• Review your organisation’s process for collecting clients’ consent.
Whatever your process may be, it must provide an active opt-in.
Additionally, keep well-organised records that clearly outline what
individuals have consented to, what they were told, and when and
how they consented.
As the GDPR will come into force in less than a year, your organisation
must begin implementing the necessary protections as soon as
possible. In fact, certain UK companies, like Wetherspoons, are
already making decisions to scrap their entire email mailing lists for
fear that they will violate the GDPR.
For more information about what measures your organisation can take
to better prepare for the GDPR, contact PIB Insurance Brokers today.
In	this	issue
Recent	Cyber-security	
News	and	Prosecutions	
Experts Claim that 80 per cent of Cyber-
attacks are Preventable
According to the former head of cyber-crime
at the National Crime Agency, 80 per cent of
cyber-attacks are preventable. To help
ensure that your organisation is able to
prevent as many cyber-threats as possible, it
is important that you regularly update your
network security, install and update anti-virus
and anti-malware software on all your
organisation’s computers, and provide your
employees with cyber-security training.
Password Expert Regrets and Revises
Past Advice
Even though you most likely don’t recognise
his name, Bill Burr is the individual
responsible for the widely held guidance on
how to craft a strong password by including
capital letters, numbers and symbols.
However, Burr has recently stated that he
regrets this advice, as the more often a
person is asked to change his or her
password, the weaker it becomes. In
response, the National Cyber Security Centre
has issued its own password creation
guidance, which requires your organisation to
change all its default passwords to a random
collection of words that are stored in a
password manager.
Separate GDPR Fact from Fiction with the
ICO’s Blog Series, ‘GDPRmyths’
In an attempt to demystify the forthcoming
GDPR, the Information Commissioner’s
Office (ICO) has launched a new blog,
GDPRmyths. Each entry on the blog is
intended to separate myths about the GDPR
from facts. Some current posts cover data
breach reporting, data protection and
consent. You can read these posts by visiting
https://iconewsblog.org.uk/tag/gdprmyths.
	 Are	You	Prepared	for	Silent	Exposures	
from	Cyber-attacks?	
Cyber-crime makes up nearly half of all reported crime in the
country, according to the annual Crime Survey of England and
Wales. While awareness of the types and potential effects of cyber-
attacks has grown, there is still one aspect that is relatively
unknown—‘silent cyber’ exposure.
Silent cyber exposure refers to potential cyber-related losses
claimed on insurance policies that are not specifically designed to
cover cyber-risks. For example, your organisation becomes infected
with organisation-wide malware, causing a lift to fail that leads to
multiple casualties and injuries. Such silent cyber exposures are
malicious and hiding in plain sight. To protect yourself, it is vital that
your organisation is proactive and reassesses its policies to ensure
that you are appropriately covered for events that may occur due to
cyber-risks.
Although it may seem nearly impossible to predict and prevent silent
exposures from occurring, there are measures that your
organisation can take to ensure that it’s prepared. The most
important practices to implement include the following:
• Hire experts to assess which areas of your business would be
vulnerable to a cyber-attack, and whether cyber-related losses
would be covered under your insurance policies.
• Contact PIB Insurance Brokers about which of your policies
may need to be adjusted in the event of a cyber-attack or cyber-
related loss if you are forced to file a claim under that policy.
Cyber Risks & Liabilities - Sept/Oct 2017

More Related Content

What's hot

Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businessesntoscano50
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Netpluz Asia Pte Ltd
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...Symantec
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdfSania Baker
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016Nathan CAVRIL
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Browne Jacobson LLP
 
Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics Chris Stallard
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan
 
Cybersecurity Facts & Figures - What Every Business Needs to Know
Cybersecurity Facts & Figures - What Every Business Needs to KnowCybersecurity Facts & Figures - What Every Business Needs to Know
Cybersecurity Facts & Figures - What Every Business Needs to KnowCBIZ, Inc.
 
FTSE350 Cyber Governance - An insight into the issues of today and tomorrow
FTSE350 Cyber Governance - An insight into the issues of today and tomorrowFTSE350 Cyber Governance - An insight into the issues of today and tomorrow
FTSE350 Cyber Governance - An insight into the issues of today and tomorrowLeona Markham
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityRow Murray
 
Mimecast Case Study - Targeted Threat Protection - Berrymans Lace Mawer
Mimecast Case Study - Targeted Threat Protection - Berrymans Lace MawerMimecast Case Study - Targeted Threat Protection - Berrymans Lace Mawer
Mimecast Case Study - Targeted Threat Protection - Berrymans Lace MawerEliza Hedegaard
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103Jack McCullough
 

What's hot (20)

Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses
 
Cyber liabilty
Cyber liabiltyCyber liabilty
Cyber liabilty
 
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businesses
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?
 
Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
 
Infographic–A Look Back at the First Year of GDPR
Infographic–A Look Back at the First Year of GDPRInfographic–A Look Back at the First Year of GDPR
Infographic–A Look Back at the First Year of GDPR
 
Cybersecurity Facts & Figures - What Every Business Needs to Know
Cybersecurity Facts & Figures - What Every Business Needs to KnowCybersecurity Facts & Figures - What Every Business Needs to Know
Cybersecurity Facts & Figures - What Every Business Needs to Know
 
FTSE350 Cyber Governance - An insight into the issues of today and tomorrow
FTSE350 Cyber Governance - An insight into the issues of today and tomorrowFTSE350 Cyber Governance - An insight into the issues of today and tomorrow
FTSE350 Cyber Governance - An insight into the issues of today and tomorrow
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - Cybersecurity
 
Mimecast Case Study - Targeted Threat Protection - Berrymans Lace Mawer
Mimecast Case Study - Targeted Threat Protection - Berrymans Lace MawerMimecast Case Study - Targeted Threat Protection - Berrymans Lace Mawer
Mimecast Case Study - Targeted Threat Protection - Berrymans Lace Mawer
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
 

Similar to Cyber Risks & Liabilities - Sept/Oct 2017

Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!topseowebmaster
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber InsuranceJohn Ryan
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance TempRohan Sehgal
 
Cyber risks and liabilities newsletter jan feb 2017
Cyber risks and liabilities newsletter jan feb 2017Cyber risks and liabilities newsletter jan feb 2017
Cyber risks and liabilities newsletter jan feb 2017Kieren Windsor
 
Cyber risks and liabilities February 2017
Cyber risks and liabilities February 2017Cyber risks and liabilities February 2017
Cyber risks and liabilities February 2017Gary Chambers
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals Richard Brzakala
 
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdfThree Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdfEnterprise Insider
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022Bernard Marr
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250Chris Crowe
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowShantam Goel
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionCBIZ, Inc.
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrimethinkwithniche
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprisesTaranggg11
 

Similar to Cyber Risks & Liabilities - Sept/Oct 2017 (20)

Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 
Cyber risks and liabilities newsletter jan feb 2017
Cyber risks and liabilities newsletter jan feb 2017Cyber risks and liabilities newsletter jan feb 2017
Cyber risks and liabilities newsletter jan feb 2017
 
Cyber risks and liabilities February 2017
Cyber risks and liabilities February 2017Cyber risks and liabilities February 2017
Cyber risks and liabilities February 2017
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals
 
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdfThree Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
 
Cyber threat forecast 2018..
Cyber threat forecast 2018..Cyber threat forecast 2018..
Cyber threat forecast 2018..
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 

More from Gary Chambers

Cyber Security Breaches Survey 2018
Cyber Security Breaches Survey 2018Cyber Security Breaches Survey 2018
Cyber Security Breaches Survey 2018Gary Chambers
 
Millennially Minded - Future of Work
Millennially Minded - Future of WorkMillennially Minded - Future of Work
Millennially Minded - Future of WorkGary Chambers
 
Cyber Risks - Legal innovation 2018
Cyber Risks - Legal innovation 2018Cyber Risks - Legal innovation 2018
Cyber Risks - Legal innovation 2018Gary Chambers
 
UK Employee Absence - Provided by Raconteur
UK Employee Absence - Provided by RaconteurUK Employee Absence - Provided by Raconteur
UK Employee Absence - Provided by RaconteurGary Chambers
 
The Wannacry Effect - Provided by Raconteur
The Wannacry Effect - Provided by RaconteurThe Wannacry Effect - Provided by Raconteur
The Wannacry Effect - Provided by RaconteurGary Chambers
 
Banned buzzwords by Raconteur
Banned buzzwords by RaconteurBanned buzzwords by Raconteur
Banned buzzwords by RaconteurGary Chambers
 
Benefits of Cyber Insurance
Benefits of Cyber InsuranceBenefits of Cyber Insurance
Benefits of Cyber InsuranceGary Chambers
 
Regulatory Update - Criminal finances Act
Regulatory Update - Criminal finances ActRegulatory Update - Criminal finances Act
Regulatory Update - Criminal finances ActGary Chambers
 
12 steps to prepare for GDPR
12 steps to prepare for GDPR12 steps to prepare for GDPR
12 steps to prepare for GDPRGary Chambers
 
Energy Efficiency Insurance Brochure
Energy Efficiency Insurance BrochureEnergy Efficiency Insurance Brochure
Energy Efficiency Insurance BrochureGary Chambers
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkGary Chambers
 
Employment Law - Criminal Record Checks
Employment Law - Criminal Record ChecksEmployment Law - Criminal Record Checks
Employment Law - Criminal Record ChecksGary Chambers
 
HSE Safety Cornerstones - August 2017
HSE Safety Cornerstones - August 2017HSE Safety Cornerstones - August 2017
HSE Safety Cornerstones - August 2017Gary Chambers
 
HSE Business Plan2017/18
HSE Business Plan2017/18HSE Business Plan2017/18
HSE Business Plan2017/18Gary Chambers
 
News brief - Spring Budget 2017 highlights
News brief - Spring Budget 2017 highlightsNews brief - Spring Budget 2017 highlights
News brief - Spring Budget 2017 highlightsGary Chambers
 
HR Brief - First Quarter
HR Brief - First QuarterHR Brief - First Quarter
HR Brief - First QuarterGary Chambers
 
Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidanceGary Chambers
 
2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UK2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UKGary Chambers
 
Professional Indemnity
Professional IndemnityProfessional Indemnity
Professional IndemnityGary Chambers
 
Standard Terms of Business and Non Standard Terms
Standard Terms of Business and Non Standard TermsStandard Terms of Business and Non Standard Terms
Standard Terms of Business and Non Standard TermsGary Chambers
 

More from Gary Chambers (20)

Cyber Security Breaches Survey 2018
Cyber Security Breaches Survey 2018Cyber Security Breaches Survey 2018
Cyber Security Breaches Survey 2018
 
Millennially Minded - Future of Work
Millennially Minded - Future of WorkMillennially Minded - Future of Work
Millennially Minded - Future of Work
 
Cyber Risks - Legal innovation 2018
Cyber Risks - Legal innovation 2018Cyber Risks - Legal innovation 2018
Cyber Risks - Legal innovation 2018
 
UK Employee Absence - Provided by Raconteur
UK Employee Absence - Provided by RaconteurUK Employee Absence - Provided by Raconteur
UK Employee Absence - Provided by Raconteur
 
The Wannacry Effect - Provided by Raconteur
The Wannacry Effect - Provided by RaconteurThe Wannacry Effect - Provided by Raconteur
The Wannacry Effect - Provided by Raconteur
 
Banned buzzwords by Raconteur
Banned buzzwords by RaconteurBanned buzzwords by Raconteur
Banned buzzwords by Raconteur
 
Benefits of Cyber Insurance
Benefits of Cyber InsuranceBenefits of Cyber Insurance
Benefits of Cyber Insurance
 
Regulatory Update - Criminal finances Act
Regulatory Update - Criminal finances ActRegulatory Update - Criminal finances Act
Regulatory Update - Criminal finances Act
 
12 steps to prepare for GDPR
12 steps to prepare for GDPR12 steps to prepare for GDPR
12 steps to prepare for GDPR
 
Energy Efficiency Insurance Brochure
Energy Efficiency Insurance BrochureEnergy Efficiency Insurance Brochure
Energy Efficiency Insurance Brochure
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at Work
 
Employment Law - Criminal Record Checks
Employment Law - Criminal Record ChecksEmployment Law - Criminal Record Checks
Employment Law - Criminal Record Checks
 
HSE Safety Cornerstones - August 2017
HSE Safety Cornerstones - August 2017HSE Safety Cornerstones - August 2017
HSE Safety Cornerstones - August 2017
 
HSE Business Plan2017/18
HSE Business Plan2017/18HSE Business Plan2017/18
HSE Business Plan2017/18
 
News brief - Spring Budget 2017 highlights
News brief - Spring Budget 2017 highlightsNews brief - Spring Budget 2017 highlights
News brief - Spring Budget 2017 highlights
 
HR Brief - First Quarter
HR Brief - First QuarterHR Brief - First Quarter
HR Brief - First Quarter
 
Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidance
 
2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UK2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UK
 
Professional Indemnity
Professional IndemnityProfessional Indemnity
Professional Indemnity
 
Standard Terms of Business and Non Standard Terms
Standard Terms of Business and Non Standard TermsStandard Terms of Business and Non Standard Terms
Standard Terms of Business and Non Standard Terms
 

Recently uploaded

Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 

Recently uploaded (20)

VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 

Cyber Risks & Liabilities - Sept/Oct 2017

  • 2. How GDPR Will Expand Your D&O Liability The forthcoming GDPR may place greater responsibility on your organisation’s directors and officers, and, for that reason, it is important to take proactive steps now to prepare. Are You Prepared for Silent Exposures from Cyber-attacks? ‘Silent cyber’ exposure refers to potential cyber- related losses due to insurance policies that are not specifically designed to cover cyber-risks. Learn how you can safeguard your organisation from these types of exposures with this beneficial guidance. Recent Cyber-security News and Prosecutions Read about how experts claim that 80 per cent of cyber-attacks are preventable, why a password expert regrets his previous advice and take a peek at the ICO’s new blog series. How GDPR Will Expand Your D&O Liability On 25 May 2018, the General Data Protection Regulation (GDPR) comes into effect, which expands the rights of individuals and their data while placing greater obligations on organisations that process personal data. As cyber-related requirements become more stringent under the GDPR and directors and officers (D&Os) shoulder more liability than ever before, industry experts are wondering whether D&Os will soon be held personally liable for cyber-breaches or neglecting to prioritise cyber compliance. D&Os who disregard their responsibility to ensure an organisation-wide commitment to the GDPR and cyber compliance could face legal action after a data breach. In fact, there have been four cases brought against directors in the United States for cyber- attacks, including Target and Home Depot executives. In order to ensure that your organisation’s directors and officers are prepared for the new responsibilities placed upon them by the GDPR, consider making the following revisions: • Ensure your D&O liability policy does not contain any specific exclusions about data breaches. • Prioritise cyber-security at the highest level of your organisation by building cyber-governance into your organisational structure. Emphasise that cyber-security and GDPR compliance is the entire organisation’s concern, from the board members all the way down to the interns. • Review your organisation’s process for collecting clients’ consent. Whatever your process may be, it must provide an active opt-in. Additionally, keep well-organised records that clearly outline what individuals have consented to, what they were told, and when and how they consented. As the GDPR will come into force in less than a year, your organisation must begin implementing the necessary protections as soon as possible. In fact, certain UK companies, like Wetherspoons, are already making decisions to scrap their entire email mailing lists for fear that they will violate the GDPR. For more information about what measures your organisation can take to better prepare for the GDPR, contact PIB Insurance Brokers today. In this issue
  • 3. Recent Cyber-security News and Prosecutions Experts Claim that 80 per cent of Cyber- attacks are Preventable According to the former head of cyber-crime at the National Crime Agency, 80 per cent of cyber-attacks are preventable. To help ensure that your organisation is able to prevent as many cyber-threats as possible, it is important that you regularly update your network security, install and update anti-virus and anti-malware software on all your organisation’s computers, and provide your employees with cyber-security training. Password Expert Regrets and Revises Past Advice Even though you most likely don’t recognise his name, Bill Burr is the individual responsible for the widely held guidance on how to craft a strong password by including capital letters, numbers and symbols. However, Burr has recently stated that he regrets this advice, as the more often a person is asked to change his or her password, the weaker it becomes. In response, the National Cyber Security Centre has issued its own password creation guidance, which requires your organisation to change all its default passwords to a random collection of words that are stored in a password manager. Separate GDPR Fact from Fiction with the ICO’s Blog Series, ‘GDPRmyths’ In an attempt to demystify the forthcoming GDPR, the Information Commissioner’s Office (ICO) has launched a new blog, GDPRmyths. Each entry on the blog is intended to separate myths about the GDPR from facts. Some current posts cover data breach reporting, data protection and consent. You can read these posts by visiting https://iconewsblog.org.uk/tag/gdprmyths. Are You Prepared for Silent Exposures from Cyber-attacks? Cyber-crime makes up nearly half of all reported crime in the country, according to the annual Crime Survey of England and Wales. While awareness of the types and potential effects of cyber- attacks has grown, there is still one aspect that is relatively unknown—‘silent cyber’ exposure. Silent cyber exposure refers to potential cyber-related losses claimed on insurance policies that are not specifically designed to cover cyber-risks. For example, your organisation becomes infected with organisation-wide malware, causing a lift to fail that leads to multiple casualties and injuries. Such silent cyber exposures are malicious and hiding in plain sight. To protect yourself, it is vital that your organisation is proactive and reassesses its policies to ensure that you are appropriately covered for events that may occur due to cyber-risks. Although it may seem nearly impossible to predict and prevent silent exposures from occurring, there are measures that your organisation can take to ensure that it’s prepared. The most important practices to implement include the following: • Hire experts to assess which areas of your business would be vulnerable to a cyber-attack, and whether cyber-related losses would be covered under your insurance policies. • Contact PIB Insurance Brokers about which of your policies may need to be adjusted in the event of a cyber-attack or cyber- related loss if you are forced to file a claim under that policy.