It can go by any number of names—the cyberhurricane or the digital earthquake—but the concept is the same: it's all about computer crime. crime at a magnitude so enormous that it threatens to disrupt the Internet, affecting the communications and business operations of a large number of companies simultaneously.
A constant onslaught of minievents have primed CSOs for the credibility of this notion. From the I Love You virus to Nimda, Code Red, Klez and Bugbear, security executives have had a sufficient taste of the financial costs and management headaches associated with fending off cyberattacks to understand that the threat to their companies is real. And potentially greater hazards loom on the horizon—superworms and cyberterrorism to name just a few.
So call it what you will, CSOs increasingly stand poised for The Big One.
While such an event poses an ever-present fear for CSOs, insurance companies see it as both a business opportunity and a challenge. Many insurers are marketing e-risk insurance products specially tailored to address the corporate security risks posed by the Internet, but the process behind offering e-risk insurance is currently much more an art than it is a science.
Cybercoverage
Mainstream business insurance policies were never meant to cover the astronomical financial and reputational costs that a virus or other technology-related business disruption can cause. The publicized theft of sensitive corporate data like credit card numbers has hastened a number of companies, such as Flooz.com, into bankruptcy. And in just the first five days of circulation, the I Love You virus cost businesses $6.7 billion, according to researcher Computer Economics. The insurance industry's reaction to the growing risks posed by Internet activity has been twofold: First, they've written exclusions into their basic business policies that Internet-related risks will not be covered. Second, they've seized the opportunity to develop and market specially tailored cyberinsurance or e-risk policies that offer specific coverage against hackers, viruses and cyberextortion. Policies like that would once have only made sense for customers that were betting their entire business on the Web, but the Internet has become so tightly woven into the operations of most large organizations that that is no longer the case. "Most companies with websites have gone from putting out brochures to being high-intensity publishers," says David O'Neill, vice president for e-business solutions at Zurich North America. "That opens the door to copyright, trademark infringement, electronic extortion and other computer crimes."
Policies vary widely in terms of what they cover. Some take a cafeteria approach, allowing companies to pick and choose only the specific coverage they require. But the challenge is that, while there's no shortage of security statistics coming out of law enforcement and security research companies, very little has been done to map those figures to the financial losses actually incurred by companies. Consequently, insurers are still deciding how to price the coverage. And because the actuarial models behind the policies are vague and differ greatly between insurers, companies looking for an e-risk policy are often comparing apples with oranges. To further muddy the waters, the pressure on companies to assess, mitigate or transfer any perceived risks to their business viability has never been greater. So what's the risk-sensitive CSO to do? Here's what you'll need to know when evaluating cyberinsurance.
Push and Pull
Many corporate risk managers assume their company's commercial property/casualty policies will cover any business disruptions that result from security breaches. They're often wrong. In a recent survey of financial institutions mentioned in NYSE Magazine, more than three-quarters of the 76 percent of respondents who identified e-commerce as their number-one risk-management issue also erroneously stated that they were covered for cybercrimes under their traditional insurance policies.
Most standard business insurance policies cover only the damage or theft of tangible assets like buildings or equipment. "Computer code is deemed to be intangible," says O'Neill. "Property and casualty policies were never written to assess these exposures and were never priced to include them."
Until recently, traditional property insurance may have provided some coverage for virus-related exposures, but as of January 2002, the majority of insurers eliminated it as well. The reason: the reinsurance or secondary market—which functions like a bookie with whom the primary insurance industry lays off its bets to minimize undue risk concentration—is concerned by the notion of the cyberhurricane. "It could affect thousands of companies simultaneously with no geographic locus," potentially causing too much exposure to individual insurance companies, says Jeffrey Grange, senior vice president and global manager of fidelity and professional liability products for The Chubb Group.
The second reason insurance companies are moving cautiously in that area is the reality of insuring a post-Sept. 11 world. The prospect of significant business disruption to the telecommunications network on which technology platforms run is that much more real after 9/11. It is also considered likely that a next wave of terrorist attacks could come in the form of cyberattacks aimed at disrupting significant portions of the critical infrastructure and targeting the technology backbone of various enterprises.
The result of those market pressures has been a retrenchment on the part of insurers and reinsurers that
Similar economic pressures are making cyberinsurance that much more important for companies whose risk-management practices are facing growing scrutiny by government groups and investors. For many companies
Regulatory developments are also going to increase the pressure on companies to account for and mitigate risk. The Basel Capital Accord, which was developed in 1988 by an international banking organization to promote the safety of the global financial system, has been updated with new regulations that are due to take effect in 2004. The new accord will specify methodologies by which financial institutions must measure their operational risk
And what if the data were a pharmaceutical formula for a groundbreaking new drug and it was stolen and sold to a competitor? The entire company is less valuable because that information has been compromised. "The value of data is difficult to determine, and the value is often only relevant to that particular organization," says Doug McCarthy, senior operations analyst in technology underwriting for The St. Paul Cos. Given the difficulty of placing a value on that kind of intangible information, it's important that CSOs work with an insurer that shows a keen understanding of its industry.
Most lines of coverage in the insurance industry are backed by precise actuarial tables that inform the pricing process. For example, an auto insurer can look at the accident and theft rates for the state you live in, your driving record and the value of your car, and figure out precisely how much it should charge for coverage. The actuarial tables for cyberinsurance are still a work in progress, but an interesting partnership has been developing between the government and the insurance industry to try and flesh out those figures.
The Critical Infrastructure Protection Board (CIPB), which was established by President Bush in October 2001, has taken a keen interest in the insurance industry. When a weather-related disaster occurs, the government can send in the Federal Emergency Management Agency, or FEMA, to provide recovery assistance and funding, but there is no such mechanism for a cyber-based event. With nearly 90 percent of the critical infrastructure in the hands of private industry, the government wants to ensure that there is a relief function in place. The government is hoping cyberinsurance will gain currency among companies and assume that role. To make that happen, the CIPB has developed a working group with insurance industry members to try to pool the data that exists within the government and the insurance industry to develop actuarial tables. It's a difficult process that's expected to continue into 2005. "The data exists in many sources within the private and government sectors," says Grange, a member of the working group. "There's a complete alignment in interest between private sector insurance and the government in terms of cyber-risk management and the need to understand the bottom-line costs."
While sharing data might sound like a fairly simple process, it's fraught with complexities: from the age-old problem of companies unwilling to confess the details of a security breach to the absence of legal precedent for the liability that companies could face in a court of law due to a security breach. "Nobody really knows what data they're looking for," says a source close to Richard Clarke, President Bush's cybersecurity adviser. "Companies have traditionally not factored in cyberlosses. When Code Red and Nimda happened, some companies took a big hit, but there were no metrics for tracking what it cost
Given that, insurers are taking two basic elements into account in setting the premiums for their e-risk policies. The first is the security audit that most insurers require as a prerequisite to coverage. The audit (conducted by a third-party security management company) usually involves the submission of an application overview of the company's operations and completion of a security questionnaire. Most auditors will also take a close look at the security policies a company has in place
The second area that insurers are looking at is the fundamentals of your business