Sharing Expertise: Tech-Talk at ECIA

After-hours networking for Technology Risk Control Manager Tushar Nandwana recently meant sharing insights on the fast-developing state of artificial intelligence. Tushar was among several speakers featured at the Electronic Components Industry Association (ECIA) Regional Series in Phoenix. His technology underwriting colleague Denise Oppelt was also there, along with Nate Call from USI Phoenix (pictured below). Visit the ECIA website for insights on this association and the Regional Series.

ecia-phoenix

Intelligence 2.0: Where Artificial Gets Real

There are days when we’d prefer for someone else to do the thinking for us – and these days, that wish is not so far-fetched! One of the more opportunistic developments has been the field of artificial intelligence (“AI”). With the overwhelming amount of data available to help us assess and evaluate matters, using AI to rapidly digest information presents a potential sea change in many industries. From language translation to diagnosing and treating cancer, it’s applications are far-reaching.

We’re excited to share our most recent whitepaper titled “The reality behind Artificial Intelligence” authored by Technology Risk Control Manager Tushar Nandwana. In this paper, Tushar explains the various forms of AI and how they function, describes several examples of AI and offers a view of risks and concerns.

To view our entire technology-focused whitepapers library, visit our dedicated technology insurance website.

artificialintelligent

Cyber Risk Claims: An Inside View

As the interest in cyber insurance products escalates, getting a clearer view of claims trends is critical. NetDiligence, a cyber risk assessment and data breach services company, recently published a comprehensive analysis of reported data breach and other cyber event losses. Titled, 2016 Cyber Claims Study, the report was sponsored by OneBeacon Technology among others. Topics include the types of data exposed, causes of loss, business sectors involved, sizes of affected organizations, insider involvement, and third-party involvement. New analyses include:

  • Cloud involvement
  • Cyber extortion/Ransomware
  • Phishing
  • Phishing and wire transfer fraud
  • POS-related/common point of purchase/CPP investigations

Additionally, the costs associated with crisis and recovery services (e.g., forensics, notification, credit/ID monitoring, legal counsel and miscellaneous other), legal damages (defense and settlement), regulatory action (defense and settlement) and PCI fines are highlighted.

We invite you to download this whitepaper and to review our technology and life science library of whitepapers, visit our website resource library.

netdiligence_2016_claimsstudy_infographic-2

Digital Pirates Seek More Than Free Music

How many warnings have you seen about clicking on unfamiliar links or confirming email addresses to be sure it’s a known and trusted source? Typically the goal is avoiding a computer virus, but you also need to be aware of digital pirates eager to seize computer files in exchange for a ransom fee. Sound far-fetched? Hardly; ransomware has been around since 1989 and has become more widespread in recent years. These digital pirates are becoming cleverer, making avoiding these intrusions an important defensive concern.

We’re pleased to share our most recent whitepaper titled “Minimizing the Impact of Ransomware” authored by VP & Senior InfoTech Product Manager Joe Budzyn. As you’ll read, Joe defines ransomware, how it typically appears and steps for mitigating such an attack.

. Our complete library of technology-focused whitepapers is available on our website.

ransomware.

OneBeacon Expertise at Data Breach Summit

Are you attending the SANS Institute’s Data Breach Summit in Chicago today? OneBeacon’s John Wurzler will be facilitating a session this afternoon with conference host and SANS Institute instructor Benjamin Wright. Following the premise that “learning comes from doing,” attendees will break into small discussion groups, receive a fact scenario and develop an action plan. The exercise will emphasize collaboration among experts such as CISOs, lawyers and risk managers. Speakers from earlier in the day will participate.

SANS_Data-Breach.jpg

Pokemon GO: Fun For Some; Risks for Others

The game’s the thing this summer and that game is, of course, Pokémon GO. With anything new, emerging risks and exposures must be considered. OneBeacon Technology Insurance’s Lloyd Takata was among several technology insurance specialists quoted in Carrier Management’s  article on the game’s potential risks and exposures. We invite you to read and learn more!

PokemonGo

 

 

OneBeacon Tech’s Molitano at Cyber & Data Risk Insurance Conference

OneBeacon Technology Insurance’s David Molitano was a featured panelist today at the American Conference Institute’s Cyber & Data Risk Insurance Conference taking place in NYC. Now in its 13th year, this premier event gathers insurance professionals, attorneys and others specializing in technology, insurance coverages, prevention strategies and more offers. David’s panel shared expertise regarding the emerging perils affecting cyber liability, the Internet of things, collecting biometrics data and other new technologies.

OneBeacon Technology specialists are often invited to speak at leading industry conferences. View our website’s Events page for more details!

677I16_header

International Privacy Governance

International privacy governance has been unsettled since last fall’s decision by a European Court invalidated the US-EU Safe Harbor program governing trans-Atlantic data transfers. The interim measure is a “Privacy Shield” program. If you have international exposures, being informed of this shifting international regulatory environment is important.

OneBeacon Technology Insurance is pleased to present a whitepaper authored by cybersecurity attorneys from Troutman Sanders LLC titled “US-EU Privacy Shield Program.” The report explains the program and its requirements, as well as the elements of the December 2015 decision to adopt the General Data Protection Regulation, which takes effect in 2018.

privacyshield