article thumbnail

France: Changes to insurability of cyber losses

DLA Piper Privacy Matters

LOPMI introduces amendments to the insurability of losses and damages paid in response to cyber-attacks, including in relation to ransom payments – requiring that the payment of insurance compensation be conditional on the filing of a complaint, within a 72 hour time frame, to competent authorities.

article thumbnail

New York Regulators Call on Insurers to Strengthen the Cyber Underwriting Process

Hunton Privacy

As reported on the Hunton Insurance Recovery blog , on February 4, 2021, the New York Department of Financial Services (“NYDFS”), which regulates the business of insurance in New York, has issued guidelines, in the Insurance Circular Letter No.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Is Integrated Risk Management? Definition & Implementation

eSecurity Planet

For example, a clothing brand might select a business objective such as to develop unique and appealing designs. In the examples above, the clothing brand will use traditional and computer-aided design prototyping and marketing research. What objectives deliver maximum value to shareholders?

Risk 67
article thumbnail

How to Decrypt Ransomware Files – And What to Do When That Fails

eSecurity Planet

First, call the cyber insurance company that issued the organization’s cybersecurity policy. Most insurance companies require specific incident response vendors, procedures, and reporting that must be met to meet the standards to be insured. Insured companies often will not have options. The First Calls After an Attack.

article thumbnail

Data analytics – how should insurers look to the future?

CGI

Data analytics – how should insurers look to the future? With a plethora of new data sources across the property and casualty (P&C) general insurance lifecycle now becoming available, how do insurers create an all-encompassing data analytics policy for the future? Tue, 09/12/2017 - 03:00. Connected and monitored energy usage.

article thumbnail

Acuity Who? Attempts and Failures to Attribute 437GB of Breached Data

Troy Hunt

Does that mean that Netflix, for example, provided customer data to this list? So how many "Acuity" companies are out there in total?! Some more data points before going further: The files is named "ACUITY_MASTER_18062020.csv"

Insurance 122
article thumbnail

Cybersecurity Incident Highlights Questions about Cyber Insurance Coverage

Hunton Privacy

On October 8, 2014, the Department of Homeland Security reported that over the course of several months, the network of a large critical manufacturing company was compromised. The incident raises some issues for cyber insurance. That the incident occurred over several months suggests that trigger dates for cyber insurance be examined.