Tag Archives: AON

How Startups Will Save Insurance

Digital disruption used to be seen by insurance industry watchers as an existential threat to the sector. That argument no longer applies. Today, there’s no argument that the insurance needs digitalization to secure its future. 

Across the financial services sector, companies are being re-defined by their clients’ needs.

It’s what happened with banks. They were driven to embrace fintech because of the speed of innovation required, and what their customers were experiencing elsewhere, particularly in the retail sphere. In the same way, insurers (and brokers) are looking to insurtech for answers.

Actually, the insurance industry doesn’t have a choice, with insurance spending as a percentage of GDP declining over the course of the last two decades. The industry’s share of GDP has declined from a high of 7.5% in 2002 to 6.1% in 2017 (source: Swiss Re Sigma Explorer Dataset 2019).

This is happening in part due to an increase in the world’s population and disproportional prosperity growth in emerging markets, creating more consumers who need to protect their property and families. Meanwhile, value is changing in the corporate rankings, where businesses with high-value intangible assets, like Google, Alibaba or Apple, have overtaken companies trading in more tangible products.

It all points to a need for risk management and for the insurance industry to drive innovation and its relevance – especially during a period of great change. Arguably, the incumbent market simply should be innovating at a quicker pace to meet the evolving needs of its client base and its stakeholders.

Many clients today have unmet risk transfer needs, related to intellectual property, the gig worker economy, cyber threats, pandemic or climate, for example. We as an industry need to acknowledge these differences across traditional and emerging markets, tangible and intangible assets, and deliver a differentiated approach in our increasingly connected world.

Meanwhile, the entire sector – brokers and insurers – has been making healthy profits. This combination of an inverted innovation curve and profit pool has proved to be irresistible to entrepreneurs.

See also: Will COVID-19 Disrupt Insurtech?  

Incumbents’ fears around digital disruption are misplaced, however. After all, when the fintech wave hit the banking sector, it didn’t knock out the big players like JPMorgan Chase, Bank of America and Citi. They retained their positions because they took the best of innovation and applied it.

In a similar way, the insurance industry can and will adapt to the direction of change in the use of technology-enabled platforms.

The insurance industry has to incorporate digital distribution and automation in underwriting, the intersection of data science and actuarial science, to design modern underwriting models and create larger pools of insurable risk in ways that insurers remain profitable covering them.

Common ground with clients

Our clients themselves are looking for innovative solutions, so we have common ground. For example, new technology in trucks now allows for user-based analysis of driving behavior. Aon Affinity partnered with CarrierHQ to roll out a new motor insurance program that applies third-party data, real-time driving analytics and a proprietary rating algorithm to score each driver in a fleet of 20 or fewer trucks. Premiums are adjusted monthly for each truck based on the driver scores. To power this behind the scenes, Aon partnered with Instec to enhance the customer experience for small fleet trucking while improving underwriting results for the insurers.

By using our data analytics and insight, we can design technology-enabled platforms for all kinds of business, big and small. It’s why Aon acquired Coverwallet, the leading digital insurance platform for small and medium-sized businesses. 

The evolution is unstoppable because innovation benefits both the insurance markets and the underlying consumer. 

Even pacesetters like Amazon and Uber continue to be defined by their clients and appreciation of the transparency and convenience these platforms afford them.

See also: Time to Retire the Term ‘Insurtech’?  

To meet the needs of a changing consumer, incumbent businesses – including insurers – need to be client-driven and data-centric to embrace innovation and better network among themselves.

But crucially, everyone needs to stay safe in a dynamic environment heightened by cyber risk, global pandemics and climate change, a problem that insurtech is helping resolve to the benefit of both insurers and insureds.

Coronavirus Boosts Cyber Risk

Concern about the spread of the coronavirus has triggered the largest “work-from-home” mobilization in history. Here are practical steps that organizations can take to remain cyber resilient amid the crisis.

The outbreak of COVID-19 has caused significant disruption to businesses and a degree of panic within the employee community. Companies across Asia have activated contingency and business continuity plans and have allowed or instructed employees to work from home to limit the spread of the virus. In a new reality where millions of people are working remotely, secure networks are now more critical than ever. To remain operational and secure, Aon recommends that companies take the following steps:

Defend Against the Phishing Wave

Malicious actors will leverage the intense focus placed on the virus and the fear and panic it creates. Security researchers have already observed phishing emails posing as alerts regarding COVID-19. These emails will typically contain attachments that purport to offer information about the outbreak or updates on how recipients may stay safe. In an environment where people are stressed and hungry for more information, there is a lack of commitment to security best practices.

This is the time for organizations to remind employees of the need for vigilance and the dangers of opening attachments and links from untrusted sources. Running a simulated spear phishing campaign can also demonstrate the level of resilience to these attacks. At a more technical level, up-to-date antivirus and monitoring tools can limit the effectiveness of successful spear phishing attacks.

Test System Preparedness

Organizations will be experiencing an unprecedent amount of traffic accessing the network remotely. Companies with an agile workforce have been preparing for this contingency for some time and will be well-equipped to maintain network integrity through the use of sophisticated virtual private networks (VPNs) and multi-factor authentication. Enterprise security teams are recommended to increase monitoring for attacker activities deriving from work-from-home users, as employees’ personal computers are a weak point that attackers will leverage to gain access to corporate resources.

For those less prepared, COVID-19 presents a challenge. There is a risk that the increased volume of network traffic will strain IT systems and personnel and that employees will be accessing sensitive data and systems via unsecure networks or devices. We recommend that these organizations migrate as quickly as possible to remote working and bring-your-own-device (BYOD) standards. Virtual private networks (VPNs) should be patched regularly (for example, a vulnerability in the Pulse Secure VPN was patched in April 2019, but companies that failed to update were falling victim to ransomware in December), and networks should be load-tested to ensure that the increased traffic can be handled.

See also: Coronavirus: What Should Insurers Do?  

Brace for Disruption

A remote workforce can make it more difficult for IT staff to monitor and contain threats to network security. In an office environment, when a threat is detected, IT can immediately quarantine the device, disconnecting the endpoint (i.e., the compromised computer) from the corporate network while conducting investigations. Where users are working remotely, organizations should ensure that, to the extent possible, IT and security colleagues are readily contactable and ideally able to physically address a compromise at its source. Sophisticated endpoint detection and response (EDR) software can also be used to quarantine workstations remotely, limiting the potential for malicious actors to move through the network.

As this risk moves beyond the technical, companies should adopt
an enterprise risk approach. This can include rehearsing business continuity plans (BCP) and senior management response through tabletop crisis simulations that focus on cyber scenarios as well as how pandemics and other similarly disruptive events are likely to affect automation, connectivity and cyber resilience.

Companies can also safeguard against the increased risk of disruption through a robust cyber insurance policy that, in the event of a digital disruption to systems, can provide cover for business interruption losses, as well as the costs of engaging forensic experts to investigate and remediate a breach.

COVID-19 presents a range of challenges to businesses across Asia, but developments in technology since the SARS outbreak mean companies can remain operational and nimble in the face of uncertainty. Keeping one eye on the pervasive cyber threat in the midst of this crisis is critical to ensuring continuing success.

When Are CPAs Liable for Cybersecurity?

Cybersecurity attacks are inevitable. That’s the unfortunate reality. In fact, in a special report, Cybersecurity Ventures projects cybercrime’s global cost will exceed $1 trillion between 2017 and 2021.

Safeguarding clients’ nonpublic information from cyber-criminals is a top priority for CPA firms. The latest data breach statistics from the 2017 Identity Theft Resource Center Data Breach Report show an alarming number of exposed consumer records in the U.S.

  • 1,579 reported breaches, exposing 179 million records
  • 55% of all breaches involved businesses
  • 59% of all breaches resulted from hacking by outside sources
  • 53% of all breaches exposed Social Security numbers

Now more than ever, organizations and accounting firms of all sizes need to be vigilant about protecting data and responding to threats.

What’s my liability?

“That’s a big question we hear from firms regardless of whether they’ve been attacked,” said Stan Sterna, vice president and risk control specialist for Aon. “There are actually no uniform federal laws on business cybersecurity. But there is a patchwork of state and federal rules.”

Under certain state laws, CPAs can face liability for cybersecurity breaches that expose personal information. Most states have rules for handling breach notifications and for what remediation measures need to be taken. Breach requirements depend on where the client resides – not where your firm is located. We encourage you to learn the dynamic requirements of states that apply to you.

The Texas data breach notification law has been amended several times since its passage in 2009. It requires notification of affected individuals in the event a data breach results in the disclosure of unencrypted personal information consisting of an individual’s first name or first initial, last name and certain personal information such as Social Security and driver’s license numbers.

Federal rules and law

The Safeguards Rule is enforced by the Federal Trade Commission and applies to all companies defined as financial institutions under the Gramm-Leach-Billey (GLB) Act. Businesses that prepare tax returns fall within this definition. Under the rule, businesses are required to develop a written information security plan that describes their program to protect customer information. There are five additional requirements. Learn about the rule and implement applicable compliance protocols.

Do clients have standing to sue a CPA firm if they did not suffer damages as a result of a data breach?

At the federal level, the circuit courts are split as to what constitutes sufficient standing to sue in cyber breach cases. Some courts hold that companies may be liable for damages if client or employee data is stolen, even if the theft causes no harm; instead, it’s sufficient to merely allege that the information was compromised. This broad interpretation will only further increase the risk of cyber liability claims.

Two recent decisions illustrate these differences:

  • The Sixth Circuit court, citing the defendant’s offer for free credit monitoring as evidence, joined the Seventh and Ninth circuits in holding that a cyber victim’s fear of future harm is real and provides sufficient standing to sue. This particular ruling specifically undermines the defense that if no actual cyber fraud or identity theft occurred, the victim has not been damaged and has no standing to sue.
  • However, in another case, the Fourth Circuit held that a plaintiff must allege and show that their personal information was intentionally targeted for theft in a data breach and that there is evidence of the misuse or accessing of that information by data thieves. The division among the circuit courts as to standing is not likely to be resolved unless the U.S. Supreme Court decides a case on the issue.

New cybersecurity regulation sets the stage for other states to follow

In response to several highly publicized consumer data breaches, in 2017 the New York State Department of Financial Services enacted 23 NYCRR 500, “Cyber Requirements for Financial Services Companies,” with which all affected firms must now comply. These “first-in the-nation” data security regulations establish the steps that covered entities must take to secure customer data. The regulations are designed to combat potential cyber events that have a reasonable likelihood of causing material harm to a covered entity’s normal business operations.

See also: 4 Ways to Boost Cybersecurity  

Specifically, insurers, banks, money services businesses and regulated vital currency operators doing business in New York with 10 or more employees and $5 million or more in revenues must comply with the new rules. Under the provisions, companies must:

  • Conduct a cybersecurity risk assessment, prepare a cybersecurity program subject to annual audit and establish a written policy tailored to the company’s individualized risks that are approved by senior management;
  • Appoint a chief information security officer (CISO) responsible for the cybersecurity program who regularly reports on the integrity, security, policies, procedures, risks and effectiveness of the program and on cybersecurity events;
  • Establish multi-factor authentication for remote access of internal servers;
  • Encrypt nonpublic information (PII) and regularly dispose of any nonpublic information that is no longer necessary for conducting business (unless required to be retained by law).
  • Prepare a written incident response plan that effectively responds to events and immediately provides notice to the superintendent of the New York Department of Financial Services of any breaches where notice is required to be provided to any government body, self-regulatory agency or any other supervisory body or where there is a “reasonable likelihood” of material harm to the normal operations of the business;
  • Implement a written policy addressing security concerns associated with third parties who provide services to the covered entity that contain guidelines for due diligence or contractual protections relating to the provider’s policies for access, encryption, notification of cybersecurity events affecting the covered entity’s nonpublic information and representations addressing the provider’s cybersecurity policies relating to the security of the covered entity’s information systems or nonpublic information;
  • Annually file a statement with the New York Department of Financial Services certifying compliance with the regulations.

Meanwhile, the California Consumer Privacy Act of 2018 (CCPA) goes into effect on Jan. 1, 2020. The CCPA represents a significant expansion of consumer privacy regulation. Its GDPR-like statutory framework gives California consumers the:

  • Right to know what categories of their personal information have been collected
  • Right to know whether their personal information has been sold or disclosed, and to whom
  • Right to require a business to stop selling their personal information upon request
  • Right to access their personal information
  • Right to prevent a business from denying equal service and price if a consumer exercises rights per the statute
  • Right to a private cause of action under the statute

What is the impact of these new regulations on CPA firms?

Whether or not a CPA provides professional services for an entity covered by the New York Department of Financial Services or the CCPA, these new rules are important:

  • Regulation in one state frequently results in regulation in other states; both the New York and California cybersecurity regulations may serve as a template for other states contemplating cyber security legislation.
  • The regulations create a framework for plaintiffs’ attorneys to follow when alleging that a company (regardless of whether it is a New York or California covered entity) should have done more to protect private information, keep consumers informed or prevent a data breach or that a CPA firm should have detected data security issues while providing professional services.

Take preventative action now

“If someone sues your firm because of a data breach, you may have a stronger case if you can show that you’ve taken reasonable measures to help prevent an attack or theft,” Sterna advised. “Setting up systems to assist in prevention is an important aspect of managing cybersecurity risk.”

Here are three tips to get you started:

Start with an assessment. What are your cybercrime defenses? Do you have gaps in your data security procedures? Do you have controls in place? How do you document incidents when they happen? What is your response plan when incidents occur?

“Mapping where you stand today and your vulnerabilities is the best way to understand your next steps,” Sterna said. The AICPA’s cybersecurity risk management reporting framework helps you assess existing risk management programs. The Private Companies Practice Section cybersecurity toolkit can also help you understand the most common cybersecurity threats.

Implement best practices. At a minimum:

  • Use encryption wherever appropriate to protect sensitive data. This includes laptops, desktops and mobile devices. Failing to do so threatens your data and your reputation.
  • Train employees to recognize threats and safeguard equipment and data.
  • Develop and practice your response plan for various situations such as a ransomware attack, hack or ID theft.
  • Back up your data so you’ll still have access to it if it’s lost or stolen.
  • Keep your equipment physically secure in your office and on the road.

Get an outsider’s perspective. What better way to learn your firm’s vulnerabilities than to hire an expert for penetration testing? Through a penetration test, a third-party consultant will perform a test tailored to your firm’s needs and budget. They’ll provide insights on your firm’s vulnerabilities and educate you about solutions for protecting your practice. A consultant can also help you implement regular drills that test your firm’s response in the case of various attack scenarios.

See also: Cybersecurity for the Insurance Industry  

Legal and insurance considerations

CPA firms should consult with their legal counsel to assess the firm’s risk of first/third party data security claims and assess vendor data security coverage. The existence and adequacy of data security used by third-party vendors (including contract tax return preparers) is often overlooked.

CPA firms also should consult with their insurance agent or broker to review their current cyber policy to ascertain the adequacy of coverage.

This article is provided for general informational purposes only and is not intended to provide individualized business, insurance or legal advice.  You should discuss your individual circumstances thoroughly with your legal and other advisers before taking any action with regard to the subject matter of this article. Only the relevant insurance policy provides actual terms, coverages, amounts, conditions and exclusions for an insured.

Handling Transition to a Public Company

In any given year, many private companies are evaluating the potential transition from private to public ownership. An initial public offering (IPO) comes with a myriad of financial and operational concerns, ranging from public disclosure requirements to additional regulatory/compliance infrastructure, to confidentiality and trade secret concerns. One potentially under-appreciated area for consideration, for those companies considering an IPO, is directors’ and officers’ liability insurance (D&O). Recent claims trends and the March 2018 U.S. Supreme Court’s decision in Cyan emphasize the need to approach the D&O insurance topic with great diligence, and to obtain maximum protection for a company and its key executives. In our experience at Aon, key D&O topics for careful review include the following:

Beginning at the “all hands” initial kick-off meeting and through the road show, company executives are making decisions and representations that could create liability exposures. The private company D&O policy, which almost certainly excludes public securities claims, should not be so restrictive as to exclude pre-IPO preparatory and “road show” activity. Additionally, pre-IPO private company policies should contain carve-out language for “failure to launch” claims. The transition to a public company will also require clear policy language that determines how pre- and post-IPO allegations are addressed. Detailed negotiations of the “tail coverage” and “prior acts” coverage are critical to providing the appropriate protections for both the respective former private company and new public company boards and executives. IPO candidates should confirm that their current private company D&O program, with regard to terms, structure and limits, provides comprehensive pre-IPO coverage to provide a seamless transition to public company status.

Coverage Terms

Ensuring breadth of policy terms is perhaps the most critical component to a public company D&O insurance program placement. Maximizing coverage in the event of a claim is rooted in contract certainty and broadest and best-in-class terms and conditions. Unfortunately, inexperienced D&O practitioners can lead to debilitating coverage gaps and exclusions. It takes an IPO-experienced and detail-oriented brokerage tactician to obtain critical coverage enhancements. Coverage topics such as straddle claims, definition of loss and E&O exclusions can be the difference between maximizing policy proceeds and an outright claim denial. The D&O program coverage negotiations are multifaceted – the negotiations are not limited to the primary layer of insurance but, rather, involve numerous layers of negotiations with your excess insurers, including importantly your Side A insurers. IPO candidates should partner with detail-focused D&O professionals (which can include both brokers and outside counsel), to obtain maximum coverage.

See also: Why Small Firms Need Cyber Coverage  

Policy Structure

Public company D&O insurance can be markedly different in structure than private company D&O insurance. Two very common examples include the separation of limits (i.e., the D&O is no longer tied to other management liability coverages, such as employment practices and crime) and the addition of dedicated Side A difference in conditions (“DIC”) insurance. Additional structural considerations, such as entity investigative coverage, the inclusion of DIC limits within the “A/B/C” tower and the decision to run-off prior coverage or maintain continuity of a program are all structural items of critical importance to review prior to an IPO. IPO candidates should weigh the pros/cons of each approach and select a program structure that aligns with their unique risk factors and corporate purchasing philosophy.

Limits

Limits selection is not a “one-size-fits-all” question and can be influenced by various factors, including: expected offering size/market cap, industry risk factors, historical claims activity, merger/acquisition exposure, bankruptcy risk, a company’s risk retention capacity, limits availability relative to budget and board directives. Aon has several proprietary tools to assist clients in making informed decisions around the appropriate limits to purchase at the time of your offering.

Pricing

Undoubtedly, many insureds experience sticker shock when contemplating the potential cost of a post-IPO D&O program. This is particularly true in the post-Cyan world as D&O insurers consider separate state court retentions and pricing commensurate with increased ’33 Act state court exposures. This environment has led to 2018 D&O pricing (for IPOs) that, in some cases, is more than twice comparable deals in 2018. IPO candidates should prepare senior management and the board to anticipate a meaningful change as compared with the private company program with regard to D&O premium. Candidates should also work closely with their broker to align strategies to maximize the return on this premium. These strategies can include meetings with key national decision-makers at leading D&O insurers, risk/retention analyses regarding potential retention levels and competition via access to national and international D&O insurers. Partnering with a broker that has a proven ability to “make a market” for competitive D&O pricing is crucial to maximizing the marketing opportunity and obtaining competitive pricing results.

International

While this topic is germane to both public and private companies, the IPO process can be a catalyst to review broad D&O topics, including the need for locally admitted policies. In many countries, non-admitted insurance is problematic and would not be permitted to respond in the event of a claim in such a country. Particularly for D&O insurance, which is intended to help protect individuals’ personal assets, the certainty of available coverage within problematic countries is critical. All companies, particularly IPO candidates, should consider their international exposures and implement locally admitted policies as needed.

See also: The Fallacy About International Claims  

An IPO is an exciting but challenging time, for corporate issuers and their leaders. Partnership with subject matter leaders across several disciplines, such as accounting, finance, legal and insurance, can help a company execute a successful transition to public equity.

All descriptions, summaries or highlights of coverage are for general informational purposes only and do not amend, alter or modify the actual terms or conditions of any insurance policy. Coverage is governed only by the terms and conditions of the relevant policy. If you have questions about your specific coverage, or are interested in obtaining coverage, please contact your broker.

Future of Insurance to Address Cyber Perils

Standalone cyber insurance can successfully address a subset of privacy and security costs related to personally identifiable information, personal health information, payment card industry losses and increasingly some business interruption. However, outside of four industries (retail, hospitality, healthcare and financial institutions) generally no single insurance policy adequately covers cyber perils that result in funds transfers/crypto losses, bodily injury or tangible property damage-type losses. Organizations of all sizes, geographies and industries increasing rely on data analytics and technology, such as cloud computing, Internet of Things and artificial intelligence. These advancements add new and unique cyber exposures. Modeling of worst-case cyber scenarios compared with a review of the scope and exclusions of the base forms of multiple lines of insurance reveals potential material gaps in cyber coverage.

The number of cyber incidents with losses greater than $1 million (through early September 2018)

Recognize Financial Statement Impact

According to the Risk and Insurance Management Society, organizations’ total cost of risk declined for the fourth year in a row in 2017, but cyber costs moved in the opposite direction, rising 33%. Most boards of directors and management now include cyber perils and solutions in corporate governance discussions as they learn more regarding the potential financial statement impact of high-profile cyber incidents. Yet, organizations only insure a relatively small portion of their intangible assets compared with insurance coverage for legacy tangible assets.

Prudent organizations will spend the appropriate amount of time and resources on the risk management areas that are likely to have the greatest return on investment. For example, a disproportionate amount of attention is focused on cryptocurrency exposures, which affects a relatively small proportion of the corporate insurance buying population and related monetary losses. These are generally excluded from standalone cyber insurance policies.

See also: The New Cyber Insurance Paradigm  

Almost every large organization and most middle-size organizations will have some reliance on distributed ledger technology within the next few years – either directly or via one of their third-party suppliers, distributors, vendors, partners or customers. It is important for organizations to educate and prepare themselves:

1. Understand the intended scope of standalone cyber and professional liability insurance policies

Typical standalone cyber insurance policies specifically exclude funds transfers, crypto transfers and other cash and securities monetary losses. Crime policies are intended to address fund losses under specified circumstances. Similarly, payment diversion fraud coverage for “spoofing,” “phishing” and other social engineering incidents is generally excluded under cyber policies but possibly covered under crime policies.

However, two federal appellate courts recently ruled that policyholders are entitled to crime insurance coverage for losses arising from social engineering schemes.

  • July 2018: Facebook investors filed two different securities lawsuits: (1) the first based on the Cambridge Analytica user data incident; and (2) the second following Facebook’s lower-than-expected quarterly earnings release due to lower growth rate caused in part by allegedly unanticipated expenses and difficulties in complying with the European Union General Data Protection Regulation (“GDPR”).
  • Aug. 8, 2018: Securities class action litigation against a publicly reporting media performance ratings company disclosed in its quarterly earnings release that GDPR-related changes affected the company’s growth rate, pressured the company’s partners and clients and disrupted the company’s advertising “ecosystem.”

Typical professional liability and cyber policies also specifically exclude shareholder derivative securities and similar fiduciary liability litigation. A well-crafted directors and officers insurance policy is recommended to provide certain defense and indemnity coverage for such claims.

Absent extensive policy wording customization, the typical cyber insurance policy specifically excludes all bodily injuries and tangible property damage – both first-party tangible property damage (the insured’s own property) and third-party tangible property damage (property owned by someone other than the insured).

2. Silent and affirmative cyber coverage under other lines of insurance

When cyber exposure losses first emerged, insurers had not priced cyber risks into their broadly worded legacy policies, such as property and general liability. However, absent specific cyber exclusions, such as the CL 380 Cyber Exclusion, it is possible that legacy property, general liability, environmental, product recall, marine and aviation could inadvertently cover unintended cyber perils, thus the so-called silent cyber insurance coverage.

After making the first unintended cyber claims payment, some insurers, but not yet all, either exclude or sub-limit cyber risk from new standard policies and renewals. Granting affirmative full cyber limits coverage for an additional premium in such legacy policies is rare and slow to develop. Silent cyber coverage remains. In fact, according to multiple large insurance companies, the 2017 total amount of cyber-related business interruption claims payments were greater under property insurance policies than under standalone cyber policies.

Furthermore, aggregated/correlated/systemic cyber exposures have the potential to cause damages that are multiples of any loss seen to date (i.e. 10,000 customers of a cloud provider or energy/power/utilities). Catastrophe modeling for aggregated/correlated/systemic cyber risk is in its infancy. Innovative approaches for assisting insurers concerned about aggregated, clash incidents – or two different policies covering the same cyber peril – and silent cyber exposures are starting to emerge.

See also: Cyber: Black Hole or Huge Opportunity?  

To achieve cyber resiliency, consider cyber as a peril rather than as a standalone insurance policy. Assess, test, improve, quantify, transfer and respond to the larger cyber risk management issues based on a cost-benefit analysis of resource allocation. Insurance is complementary to a robust cyber resiliency risk management approach. Each organization should identify and protect its critical intangible assets and balance sheet by aligning the cyber enterprise risk management strategy with corporate culture and risk tolerance.

All descriptions, summaries or highlights of coverage are for general informational purposes only and do not amend, alter or modify the actual terms or conditions of any insurance policy. Coverage is governed only by the terms and conditions of the relevant policy. If you have any questions about your specific coverage or are interested in obtaining coverage, please contact your Aon broker. For general questions about cyber insurance, contact: Stephanie Snyder at stephanie.snyder@aon.com.