David chairs both the Privacy and Data Security Practice Group and the Intellectual Property, Technology and Media Litigation Practice...
Clients value David’s common sense and value-driven advice. Practicing in the areas of insurance coverage and reinsurance litigation –...
Ed specialises in policy coverage advice and related disputes. He acts exclusively for insurers, both in the UK and...
John Czuba has 28 years experience in the publishing industry. Since 1994 he has worked for the AM Best,...
Attorneys Ed Lewis from Weightmans LLP, David Mackenzie from Blaney McMurtry LLP and David Shannon with Marshall Dennehey Warner Coleman & Goggin discuss emerging cyber threats and associated global risks.
Special thanks to our sponsor, A.M. Best Company, Best’s Recommended Insurance Attorneys & Adjusters, including Expert Service Providers.
The Insurance Law Podcast
Emerging Global Cyber Ransom Threats Require a Strategic Response From the C-Suite
Intro: This is the Insurance Law Podcast, brought to you by Best’s Recommended Insurance Attorneys.
John Czuba: Welcome to the Insurance Law Podcast, the broadcast about timely and important legal issues affecting the insurance industry. I am John Czuba, Managing Editor of Best’s Recommended Insurance Attorneys.
We are pleased to have with us today three attorneys from Insurance Law Global, a network of law firms focused on helping clients respond to the challenges and opportunities presented by globalization and the increasingly diverse needs of the insurance industry.
Joining us today are Ed Lewis. Ed is a partner at the UK law firm, Weightmans LLP, and head of the firm’s London market sector. A specialist in cyber insurance and related data protection and privacy liabilities, Ed’s work crosses a multitude of jurisdictions and industries, including construction, technology, and professional services.
David Mackenzie is a partner with Blaney McMurtry LLP in Ontario, Canada, where he focuses on cyber, information and privacy risk, and provides counsel on related coverage matters.
Also joining us today is David Shannon, a shareholder at Marshall, Dennehey, Warner, Coleman & Goggin in Philadelphia, Pennsylvania, where he leads the Privacy and Data Security Practice Group.
Gentlemen, welcome and thank you all for joining us today.
David Mackenzie: Thank you John.
David Shannon: Yes, thanks for having us, John.
John Czuba: Today’s topic of discussion is Emerging Global Cyber Ransom Threats Require Strategic Responses from the C-Suite, as attorneys from the UK, US, and Canada discuss the latest emerging cyber threats and the expansion of regulatory risk under the General Data Protection Regulation, or GDPR, and Canada’s Personal Information Protection and Electronic Documents Act or PIPEDA.
And Ed Lewis, we are going to start the questioning today with you. Cyber ransom attacks continue to increase in magnitude and sophistication around the world. What are the newest threats you are seeing in Europe?
Ed Lewis: Well, thanks, John. For me, I would say that whilst ransomware was probably the most prevalent attack vector in 2017, this year it’s rapidly being overtaken by what I like to call “data nap”. That’s the theft or ransom, often in cryptocurrency, of personal data, and it’s proving far more lucrative in 2018 for hackers preying on businesses wary of substantial fines from regulators after the GDPR came into force in May. Based on the work my team is handling at the moment, I would say that professional service companies have been a particular target for this new threat vector.
There have been persistent and carefully planned attacks springing up across Europe for several months now, and the signs are, they are spreading into the Canada and also into the US.
The groups behind these attacks are sophisticated, they are well organized and they are utilizing dispersed infrastructure across multiple jurisdictions, which is making it extremely difficult for law enforcement to deliver an effective response.
Of course, it means the challenge for C-Suite has moved to a completely new level too. It was hard enough weighing the business interruption and reputational consequences of ransomware last year, but with data nap come the additional complexities over the legality of paying a ransom against the uncertainty of whether cyber insurance, even if it has been purchased of course, will actually lawfully indemnify fines.
Right now, my team is learning about many organizations whose leaders are really struggling with the force of the new mandatory notification requirements which the GDPR has imposed. Faced with paying a ransom or drawing public attention to a breach, some are choosing to roll the dice and pay the ransom instead, whilst keeping news of the breach locked down in spite of the new regulatory regime.
It’s a really high risk strategy, and it’s one that could reap even greater recriminations, not to mention higher fines, if the hackers can’t be bought off or word of the breach leaks out anyway.
There’s also a further problem that it could invalidate policy response, not to mention signal possible claims on D&O cover.
So for me, there’s got to be an increased focus too on where the ransom money, if it is being paid, is actually going. In this respect, the potential funding of terrorism is a key issue that needs to be considered over the world.
Whilst generally the payment of a ransom here in the UK is not illegal, if a hacker is suspected of having links to terrorism, then that suddenly becomes a whole different ball game, because the funding of terrorism is illegal under the Terrorism Act.
John Czuba: It all sounds pretty complicated, Ed. Is the insurance industry able to prepare for these challenges?
Ed Lewis: So yes, I think it is, but it needs to proceed very carefully, and they have got to engage expert advisors early on. It’s a completely new landscape that we are dealing with, John, with more regulatory and legal hoops than ever before, as well as the increased commercial pressure due to the immediacy of news and views being shared over the Internet and in turn of course consumer visibility.
Boardrooms and their insurers need to understand the threats and how to deal strategically with all the competing issues in any given incident, balanced against fiduciary obligations and of course shareholder interests.
More fundamentally though, what it also means is that we need greater awareness around the importance of cyber resilience. Identifying risks and vulnerabilities and taking steps to mitigate the impact of a breach before one happens is still by far and away the best advice.
From my perspective, insurers have a big part to play in that message, not to mention, it may help their loss ratios a little bit in the long run too. But don’t get me wrong, some are really passionate about it and doing excellent work to educate insurance buyers already. It’s just that what we really need is a unanimous call to action.
John Czuba: Ed Lewis, thank you very much. We are going to switch our questions now to David Mackenzie. And David, can you tell our audience, what is the Canadian perspective on cyber attacks?
David Mackenzie: Sure John. Thanks again for having me on this morning.
The Canadian perspective has a lot of parallels with the UK perspective. As Ed has said, criminals are global in nature and are always looking for new revenue streams and posing new security hazards. Here in Canada though, this is only part of the emerging risk facing business. The rise in attacks on sensitive data has led to increased focus on regulatory risk, which creates its own significant costs and expenses.
For example, Canada’s Mandatory Privacy Breach Reporting Requirements go into effect on November 1 and under these expanded rules, organizations will be required to provide notice to the Privacy Commissioner and those individuals potentially impacted of any privacy breach that may create a real risk of significant harm to an individual.
Now, that’s a pretty low threshold, and one that if data was potentially lost in conjunction with a ransomware attack may very well increase the cost of a breach many multiples over the cost of any ransom that’s actually paid. The Canadian laws reflect those coming into force in other jurisdictions as well, like the GDPR.
And so, the fact that the dataset involved may be collected from and stored in multiple jurisdictions makes these problems even more complicated. When you are dealing with businesses who work in multiple jurisdictions, the clients want to know which country’s laws apply to their cyber event and the answer may very well be all of them.
John Czuba: So David, in your opinion, how are insurance companies dealing with the uncertainties of emerging cyber risk?
David Mackenzie: Well, it’s a very difficult environment for insurers right now, and particularly claims people. They can’t simply rely on the experience they have generated over years of — in terms of what their policies cover and what they don’t. There is really no such thing as a standard scope of coverage in this area. Each insurer writes these risks differently, and many as well are taking on insurance broker funds that provide a different coverage again. What may be true for one policy is not likely to be true for another.
For example, some policies may require the insurer to immediately appoint experts to protect their insured’s interest, while other policies may simply reimburse insureds for the cost the insureds themselves have incurred in responding to the cyber event.
Claims people need to understand specifically what their policies cover and what they don’t and they need to have that understanding as the breach is occurring. One often has little more than a day or two to pay a ransom or data will be compromised, and making sure they get it right will often warrant expert assistance in the application of their policy language when a cyber event occurs.
Just like their insureds, they don’t want to be caught unprepared when they are facing a hacker threatening to steal their insureds’ data. They want to provide the coverage that their policies give fairly and accurately, and retaining experienced cyber coverage counsel early on will help them to do that.
John Czuba: David Mackenzie, thank you very much.
Switching now to David Shannon. David, what are you seeing with regard to this in the United States?
David Shannon: Well John, ransomware attacks continue to plague US businesses as well. As everyone has said, it’s a global issue. In many instances, smaller size businesses have come under attack, so this threat is not just for large corporations, but affects both small and large companies.
We have seen a wide variety of the types of businesses that have suffered an attack, from dental offices, to accounting and law firms, country clubs, auto dealerships, and mortgage brokers, for example.
Some attacks are sophisticated and some are not. A forensic computer security firm is usually retained immediately once an attack has been reported to an insurance carrier. The forensic firm is then able to quickly advise how sophisticated the attack is so the business can begin to make decisions on how to respond.
A significant issue is whether the company has appropriate backups for its system so that a ransom does not have to be paid. Our firm has handled matters where the ransom has been paid and others where the professional services company has made a business decision on paying the ransom, if say the backup systems have failed or they just were not adequate.
Additionally, in the United States, many cyber insurance policies will cover ransom payments, so a company needs to understand what type of cyber insurance policy that’s purchased and what is and is not covered if an attack occurs.
All this takes time too and each day that a company does not have access to its computer system can be extremely harmful, both monetarily, and obviously to a company’s reputation.
John Czuba: David, how are companies in the US actually paying the ransom if they decide to make a payment?
David Shannon: Yeah John, a payment of the ransom can be pretty complicated. Most attackers are requesting that the ransom be paid in some type of cryptocurrency, and obviously companies, most of them, are not — do not have this type of currency or the ability to quickly obtain it, particularly if it’s a small or mid-sized business.
Ideally, a company has a cyber policy that covers a ransom payment. When the coverage will — the coverage will then assist with the payment, and it also adds individuals who can review it, approve it, and then get the payment out.
But what you should remember is, once again, when time is of the essence in restoring a company’s computer system, having more people involved is going to lead to more delays and more of a burden.
In many cases, a third-party forensics firm that I discussed earlier is responding to the ransomware attack and they will take over the ransom negotiations. They obtain the currency if the ransom is going to be paid. The forensic companies have access to cryptocurrency brokers and now openly market themselves as firms that can handle these issues when an attack occurs.
Typically, the payment amount is wired from the client or its insurance company to the forensic company’s financial account. The forensic firm then purchases the cryptocurrency and will make the transfer to the hacker.
We have however seen instances where the ransom was paid and then the attacker requests another payment. The company then has to make another decision on whether to pay a second time or decide that they are just not going to get that key to unlock the system and move on to other ways to resolve their problems.
Furthermore, companies’ insurance policies may not cover another payment, so then money is coming out of the company’s bottom line.
All types of separate issues arise with each instance when you have a ransomware attack.
John Czuba: David Shannon, thanks very much for that feedback.
And gentlemen, thank you all for joining us today.
David Shannon: Thank you John.
David Mackenzie: Thank you John.
Ed Lewis: Thanks John.
John Czuba: That was Ed Lewis, a partner at the UK law firm Weightmans LLP, David Mackenzie, a partner with Blaney McMurtry LLP in Ontario, Canada, and David Shannon, a shareholder at the Marshall, Dennehey, Warner, Coleman & Goggin Law Firm in Philadelphia, Pennsylvania.
And more information on this topic can be found at www.insurancelawglobal.com.
Special thanks to today’s producer, Frank Vowinkel. And thank you all for joining us for the Insurance Law Podcast.
To subscribe to this audio program, go to our webpage, www.ambest.com/claimsresource.
If you have any suggestions for a future topic regarding an insurance law case or issue, please email us at [email protected].
I am John Czuba, and now this message.
Outro: Best’s Insurance Professionals & Claims Resource is the top website for locating qualified professionals and need to know insurance information for the claims market, brought to you by A.M. Best, the world leader in insurance industry information. Visit ambest.com/claimsresource.
Best's Insurance Law Podcast features discussions with leading insurance attorneys about timely industry issues.
Attorney Frank Zacherl discusses Covid-19 and the potential impact on claims, the economy and legal practices.
Expert Service Providers discuss what's driving the increase in the number and size of nuclear verdicts.
Adjuster discusses claims and legal challenges stemming from wildfire claims.
Attorney addresses e-discovery in litigation and steps that should be taken to preserve evidence.
Attorney addresses the Child Victim Act and the impact on litigation, claims settlements and payouts throughout New York State.
Attorney address workers' compensation cases and impact on attorneys, adjusters and insurance carriers.